© Practising Law Institute Chapter 16 Insurance Coverage for Data Breaches and Unauthorized Privacy Disclosures Steven R. Gilford* Proskauer Rose LLP § 16:1 Overview § 16:2 Applicability of Historic Coverages § 16:2.1 First- and Third-Party Coverages for Property Loss [A] First-Party Property Policies [B] Third-Party CGL Policies: Coverage for Property Damage Claims § 16:2.2 CGL Coverage for Personal and Advertising Injury Claims [A] Publication Requirement [B] Right to Privacy As an Enumerated Offense [B][1] Telephone Consumer Protection Act Cases [B][2] Fair Credit Reporting Act Cases [B][3] “ZIP Code” Cases § 16:2.3 Other Coverages [A] Directors and Officers Liability Insurance [B] Errors and Omission Policies [C] Crime Policies * The author would like to thank Proskauer associates Jacki Anderson, Michael Derksen and Bradley Lorden for their invaluable contributions in writing and updating this chapter and Proskauer summer associates Anum Chaudhry and Zachary Zermay for their work on researching updates to its 2015 supplement. (Proskauer, 2d ed., 11/16) 16–1 © Practising Law Institute § 16:1 PROSKAUER ON PRIVACY § 16:3 Modern Cyber Policies § 16:3.1 Key Concepts in Cyber Coverage [A] Named Peril [B] Claims Made § 16:3.2 Issues of Concern in Evaluating Cyber Risk Policies [A] What Is Covered? [B] Confidential Information, Privacy Breach, and Other Key Definitions [C] Overlap with Existing Coverage [D] Limits and Deductibles [E] Notice Requirements [F] Coverage for Regulatory Investigations or Actions [G] Definition of Loss [H] Who Controls Defense and Settlement [I] Control of Public Relations Professionals [J] Issues Created by Policyholder Employees [K] Coverage of a Threatened Security Breach [L] Governmental Activity Exclusion [M] Other Exclusions [N] Physical Impact from a Cyber-Attack § 16:3.3 SEC Disclosure and Other Regulatory Initiatives § 16:1 Overview The unauthorized disclosure of personal and other confidential information has become a well-known and ever-increasing risk for holders of third-party information and business data. Notification letters from companies that have suffered data breaches have become common occurrences, and high-profile breaches of millions of records at major companies have become the subject of headlines and board of directors meetings around the world.1 In addition to asserted claims of data privacy breaches, risks from technology exposures include business interruption, inability to perform obligations to others, and loss or distortion of company and client data. As businesses continue to evolve and change in an environment driven by technology, so too does the handling of sensitive information and data. Due to the ubiquity and increasing quantity of digital data, holders of information are exposed to a multitude of risks that 1. See, e.g., Maria Korolov, Cybersecurity on the Agenda for 80 Percent of Corporate Boards, CSO (May 28, 2015), www.csoonline.com/article/ 2927395/data-protection/cybersecurity-on-the-agenda-for-80-percent-ofcorporate-boards.html. 16–2 © Practising Law Institute Insurance Coverage for Data Breaches § 16:1 data can be lost or stolen.2 The costs associated with a data breach or unauthorized disclosure of confidential information can be substantial,3 and they are likely to continue to increase as governmental regulators become increasingly vigilant and sophisticated in the regulation of cyber privacy issues and concerns.4 At the same time, corporate directors and officers are facing increased exposure to liability in relation to data breaches, as plaintiffs’ attorneys have endeavored to hold them responsible for allegedly inadequate attention to data security.5 As the risks associated with data and privacy breaches continue to grow and evolve, companies and individuals have turned, in varying degrees, to their insurers for protection. According to a recent report, procurement of cyber insurance policies by clients of one leading broker increased by 27% from 2014 to 2015, with companies in the manufacturing, communications, and technology industries having the highest growth in demand.6 Historically, claims for insurance for these types of risks have been asserted under traditional coverages, including commercial general liability (CGL) policies, directors and officers (D&O) liability insurance, errors and omissions (E&O) policies, and commercial crime and first-party property and business 2. 3. 4. 5. 6. Data loss or security breaches can occur in a number of ways, including network hacking, lost or stolen laptops, spyware, phishing, insecure media disposal, hacked card swiping devices, security vulnerabilities on mobile devices, misdirected mail and faxes, insecure wireless networks, peer-topeer software, breaches in physical security, problematic software updates or upgrades, human error, rogue or disgruntled employees, and lost or stolen media. Even companies that focus on storing passwords have been hacked. See, e.g., Jose Pagliery, Irony Alert: Password-storing Company Is Hacked, CNN, June 16, 2015, http://money.cnn.com/2015/06/15/ technology/lastpass-password-hack/index.html. In 2016, the costs of a compromised record reportedly averaged $221 per record, and the average cost per data breach event was over $7 million per event, increasing from $6.5 million per event in 2015 (with some events costing tens of millions of dollars). PONEMON INSTITUTE LLC, 2016 COST OF DATA BREACH STUDY: UNITED STATES (June 2016), www-01.ibm.com/ common/ssi/cgi-bin/ssialias?htmlfid=SEL03094USEN. Costs associated with a typical data breach can include, but are not limited to, internal investigation costs, forensic experts, consumer notification, credit monitoring, crisis management, call center services, attorney fees, payment card industry fines, increased processing fees, damages, awards and settlements, agency and attorney general actions, reputational costs, and technology upgrades. Id. See section 16:3.3, infra. See section 16:2.3[A], infra. Benchmarking Trends: Operational Risks Drive Cyber Insurance Purchases, Marsh & McClennan (Mar. 23, 2016), www.marsh.com/us/insights/ research/cyber-benchmarking-trends-2016.html. (Proskauer, 2d ed., 11/16) 16–3 © Practising Law Institute § 16:1 PROSKAUER ON PRIVACY interruption policies. Insurers, however, have frequently taken the position that these traditional coverages do not cover claims for data and privacy breaches. An insurance coverage case filed by Arch Insurance Company against Michaels Stores is illustrative.7 Michaels Stores faced a series of lawsuits alleging that it had failed to safeguard customers against a security breach related to its credit and debit PIN pad terminals. Customers alleged that Michaels’ failure to secure PIN pad terminals allowed criminals to access customer financial information and to make unauthorized withdrawals and purchases. Michaels sought coverage under its traditional form CGL policy. Arch, the insurer, sued Michaels in federal court in Chicago, claiming that its policy did not cover the losses and seeking a declaration that it had no duty to defend or indemnify Michaels against the underlying claims. In the coverage lawsuit, Arch claimed that the alleged property damage in the underlying complaint was not covered because “electronic data” was excluded from the definition of tangible property. It also contended that the policy excluded damages arising out of the “loss or, loss of use, or damage to, corruption of, inability to access, or inability to manipulate electronic data.” Whether you agree with the position taken by the insurer or not, these cases are not uncommon. In recent years, similar cases have been brought involving Zurich American Insurance, 8 Colorado Casualty,9 Landmark American Insurance, 10 Federal Insurance,11 7. 8. 9. 10. 11. Complaint, Arch Ins. Co. v. Michaels Stores Inc., No. 12-0786 (N.D. Ill. Feb. 3, 2012) (case settled following summary judgment briefing without disposition). Complaint, Zurich Am. Ins. Co. v. Sony Corp. of Am., No. 651982/2011 (N.Y. Sup. Ct. July 20, 2011) (insurer claimed it was not obligated to defend or indemnify against a class action suit for hackers’ theft of identification and financial information; Zurich claimed theft of the information did not fall within policy coverage areas of “bodily injury,” “property damage,” or “personal and advertising injury”). For further discussion, see infra note 69 and accompanying text. Colo. Cas. Ins. Co. v. Perpetual Storage, Inc., 2011 U.S. Dist. LEXIS 34049 (D. Utah Mar. 30, 2011) (insurer claimed that Perpetual Storage’s insurance policy did not cover its liability for theft of a client university ’s computer backup tapes containing sensitive medical records). Landmark Am. Ins. Co. v. Gulf Coast Analytical Labs. Inc., 2012 U.S. Dist. LEXIS 45184 (M.D. La. Mar. 26, 2012) (insurer sought declaratory judgment that its policy did not cover a third-party claim related to data lost when Gulf Coast accidentally corrupted a client’s hard drives). Recall Total Info. Mgmt., Inc. v. Fed. Ins. Co., 115. A.3d 458 (Conn. 2015) (insurer claimed that Recall’s policy did not cover liability for loss of electronic data on computer tapes containing personal information of IBM employees). For further discussion, see section 16:2.2, infra. 16–4 © Practising Law Institute Insurance Coverage for Data Breaches § 16:1 Travelers,12 Columbia Casualty,13 and National Fire of Hartford,14 to name just a few. A similar line of cases exists in the first-party property context where carriers have taken the position that there is no coverage for costs incurred to respond to a security breach, usually on the theory that the loss of electronic data is not “physical” and therefore is not covered under a policy that insures only “physical loss” or “physical damage” to covered property.15 More recently, CGL and traditional property insurance policies have tended to include specific exclusions aimed at eliminating coverage for cyber risks in their entirety or at least in part.16 12. 13. 14. 15. 16. Complaint, Travelers Indem. Co. of Conn. v. P.F. Chang’s China Bistro, Inc., 14-cv-01458 (D. Conn. Oct. 2, 2014) (seeking declaration that insurer has no duty to defend or indemnify insured for underlying lawsuits stemming from a data breach that alleged the insured failed to properly safeguard its customers’ information). Complaint, Columbia Cas. Co. v. Cottage Health Sys., No. 15-cv-03432 (C.D. Cal. May 7, 2015) (seeking a declaration that there was no coverage under the insured’s “NetProtect 360” cyber policy for an underlying class action lawsuit stemming from a data breach of over 30,000 confidential medical records). Nat’l Fire Ins. Co. of Hartford v. Med. Informatics Eng’g, Inc., No. 1:16-cv00152 (N.D. Ind. May 13, 2016) (seeking declaration that insurers do not have to defend or indemnify their insured for multidistrict litigation over a data breach affecting 3.9 million patients, on grounds that claim falls outside insured’s general liability policies and is barred by several exclusions). E.g., Ward Gen. Ins. Servs., Inc. v. Emp’rs Fire Ins. Co., 7 Cal. Rptr. 3d 844 (Dist. Ct. App. 2003) (data loss due to computer crash and human error did not constitute a loss of tangible property under first-party policy); Greco & Traficante v. Fid. & Guar. Ins. Co., 2009 Cal. App. LEXIS Unpub. 636, at *12–13 (Ct. App. Jan. 26, 2009) (data lost due to power outage that did not damage physical media, such as disks, not covered by first-party policy); cf. St. Paul Fire & Marine v. Nat’l Comput. Sys., Inc., 490 N.W.2d 626, 631 (Minn. Ct. App. 1992) (misuse of trade secret information stored in binders did not constitute damage to tangible property because “the information itself was not tangible”); see section 16:2.1[A], infra. See, e.g., ISO Endorsement CG 21 07 05 14 (2013) (excluding “(1) [a]ny access to or disclosure of any person’s or organization’s confidential or personal information, including . . . financial information, credit card information, health information or any other type of nonpublic information; or (2) the loss of, loss of use of, damage to, corruption of, inability to access, or inability to manipulate electronic data”); Complaint, Arch Ins. Co. v. Michaels Stores Inc., No. 12-0786 (N.D. Ill. Feb. 3, 2012) (asserting that policy at issue excludes “electronic data” from the definition of tangible property); Recall Total Info. Mgmt., Inc. v. Fed. Ins. Co., 2012 Conn. Super. LEXIS 227 (Super. Ct. Jan. 17, 2012) (definition of property damage provided that “tangible property does not include any software, data or other information that is in electronic form.”), aff ’d, 115 A.3d 458 (Conn. 2015); see notes 29, 32, 47, and 73, infra. See generally 2 STUART (Proskauer, 2d ed., 11/16) 16–5 © Practising Law Institute § 16:1 PROSKAUER ON PRIVACY Given these lines of cases, the substantial costs associated with litigating a major coverage case, and the tactical complexities of having to simultaneously deal with claims from a cyber loss and prosecute or defend an insurance dispute, businesses have sought more clearly applicable coverages. Insurers have responded by developing insurance products specifically designed to respond to cyber issues with a panoply of names such as network risk policies, cyber insurance, and network security liability, and privacy liability and data loss policies.17 Insurers have also developed endorsements to traditional policies that may extend various coverages to cyber risks,18 though those endorsements are often narrowly drawn.19 New policy offerings may present opportunities to close gaps in an existing coverage program; however, these new insurance products should be carefully evaluated to compare the coverage offered to a particular company’s cyber risk profile, including its exposure to data and privacy breaches and to insurance already available from traditional coverages. The next section of this chapter discusses some of the issues that have arisen from the application of traditional coverages to cyber losses 17. 18. 19. A. PANENSKY ET AL., DATA SEC. & PRIVACY LAW § 14:23 (2015) (stating that a recent version of the ISO Commercial General Liability Coverage form specifically excludes electronic data as tangible property in its definition of property damage); Ins. Servs. Office, Inc., Commercial General Liability Coverage Form CG 00 01 10 01, § V (17)(b) (2008), LEXIS, ISO Policy Forms (“For the purposes of this insurance, electronic data is not tangible property. As used in this definition, electronic data means information, facts or programs stored as or on, created or used on, or transmitted to or from computer software, including systems and applications software, hard or floppy disks, CD-ROMS, tapes, drives, cells, data processing devices or any other media . . . .”). See, e.g., CyberFirst, TRAVELERS, www.travelers.com/business-insurance/ cyber-security/technology/cyber-first.shtm (last visited Aug. 16, 2016); see also CHUBB CyberSecurity Form 14-02-14874, § I.J. (2009); Philadelphia Insurance Co. Cyber Security Liability Coverage Form PI-CYB001, § I.C. (2010). See, e.g., Complaint, Clarus Mktg. Grp., LLC v. Phil. Indem. Ins. Co., No. 11-2931 (S.D. Cal. 2011) (the “Network Security and Privacy Liability Coverage Endorsement” covered damages against “any actual or alleged breach of duty, neglect, act, error or omission that result[s] in a Privacy Breach”; the parties ultimately settled and filed a joint motion to dismiss). See, e.g., Universal Am. Corp. v. Nat’l Union Fire Ins. Co. of Pittsburgh, PA, 38 Misc. 3d 859 (N.Y. Sup. Ct.) (coverage denied because “Computer Systems Fraud” rider to the insured’s Financial Institution Bond was not intended to cover “fraudulent claims which were entered into the system by authorized users”), aff ’d, 110 A.D.3d 434 (N.Y. App. Div. 1st Dep’t 2013); Tornado Techs., Inc. v. Quality Control Inspection, Inc. 977 N.E.2d 122 (Ohio Ct. App. 2012) (coverage denied because “Computer Coverage Form” did not apply to the location where back-up servers were located). 16–6 © Practising Law Institute Insurance Coverage for Data Breaches § 16:2.1 and privacy breaches. While there is still only limited case law analyzing new cyber policies, the chapter then discusses some of the important issues to consider in evaluating these more recent forms. § 16:2 Applicability of Historic Coverages Though there are a variety of potentially applicable coverages, traditional insurance for privacy and security breaches is most commonly sought under an insured’s CGL or property policies. Both types of policies cover losses relating to damage to property. CGL policies also provide coverage for certain specified types of “advertising injury” and “personal injury,” which sometimes, particularly under older forms, may include invasion of privacy. § 16:2.1 First- and Third-Party Coverages for Property Loss Insurance practitioners typically distinguish between two types of coverage—first-party coverage, which generally insures a loss to the insured’s own property, and third-party coverage, which generally provides insurance for liability claims asserted against the insured by third parties for damage to the claimant’s property.20 In the absence of dispositive exclusions for cyber risks, the availability of coverage for privacy breaches or other cyber risks under either a first-party property policy or the property coverage provision of a third-party CGL policy usually turns on the issue of whether the loss of computer data or information constitutes “physical damage” to “tangible property” under the governing policy language. Although first-party and third-party coverages apply to different types of losses, the same definitional issues are often raised by insurers and analyzed by courts assessing the availability of each kind of coverage. In each case, “property damage” is typically defined in the policy or by case law as “physical injury to tangible property, including resulting loss of use of that property . . . , or loss of use of tangible property that is not physically injured.”21 20. 21. See, e.g., Port Auth. v. Affiliated FM Ins. Co., 245 F. Supp. 2d 563, 577 (D.N.J. 2001) (explaining that third-party “liability insurance, which indemnifies one from liability to third persons, is distinct from first-party coverage, which protects against losses sustained by the insured itself”) (citation omitted), aff’d, 311 F.3d 226 (3d Cir. 2002). See generally ALLAN D. WINDT, INSURANCE CLAIMS AND DISPUTES §§ 6:5 & 6:6 (6th ed. 2013). See, e.g., Eyeblaster, Inc. v. Fed. Ins. Co., 613 F.3d 797, 801–02 (8th Cir. 2010) (liability insurance policy defined “property damage” as “physical injury to tangible property, including resulting loss of use of that property . . . or loss of use of tangible property that is not physically injured”); Big (Proskauer, 2d ed., 11/16) 16–7 © Practising Law Institute § 16:2.1 PROSKAUER ON PRIVACY Courts are divided as to whether property losses relating to computer infrastructure and data resources constitute “physical injury” to “tangible property” for purposes of an insurance claim. While cases have held repeatedly that physical damage to computer hardware is covered under first- and third-party insurance policies,22 courts have sometimes struggled with the issue of whether damage to data alone qualifies as physical injury to tangible property.23 [A] First-Party Property Policies Cases are divided over whether lost data is covered under first-party property policies. While some courts have taken the position that software and data are not tangible property,24 others have applied a 22. 23. 24. Constr., Inc. v. Gemini Ins. Co., 2012 WL 1858723, at *8 (W.D. Wash. May 22, 2012) (construction company sued insurer for coverage in underlying suit where policy defined “property damage” as “Physical injury to tangible property, including all resulting loss of use of that property” and “Loss of use of tangible property that is not physically injured”); AutoOwners Ins. Co. v. Pozzi Window Co., 984 So. 2d 1241, 1244 (Fla. 2008) (same); Mangerchine v. Reaves, 63 So. 3d 1049, 1055 n.5 (La. Ct. App. 2011) (in first-party claim against insurer, policy defined “property damage” as “physical injury to, destruction of, or loss of use of tangible property”). See generally ALLAN D. WINDT, INSURANCE CLAIMS AND DISPUTES § 11:1 (6th ed. 2013). E.g., Lambrecht & Assocs., Inc. v. State Farm Lloyds, 119 S.W.3d 16, 23–25 (Tex. App. 2003) (holding that first-party policy covered data losses due to damage to computer server: “the server falls within the definition of ‘electronic media and records’ because it contains a hard drive or ‘disc’ which could no longer be used for ‘electronic data processing, recording, or storage’”); Nationwide Ins. Co. v. Hentz, 2012 U.S. Dist. LEXIS 29181 (S.D. Ill. Mar. 6, 2012), aff ’d, Nationwide Ins. Co. v. Cent. Laborers’ Pension Fund, 704 F.3d 522 (7th Cir. 2013) (finding “property damage” under homeowner ’s insurance policy since the insured’s losses resulted from the theft of a CD-ROM, which constituted “tangible property”; however, an exclusion still applied to bar coverage); Cincinnati Ins. Co. v. Prof ’l Data Servs., Inc., 2003 WL 22102138 (D. Kan. July 18, 2003) (for purposes of third-party coverage; damage to computer hardware constitutes “property damage” and would trigger coverage, but damage to software alone does not). See section 16:2.1[A]–[B], infra. See, e.g., Liberty Corp. Capital Ltd. v. Sec. Safe Outlet, Inc., 937 F. Supp. 2d 891, 901 (E.D. Ky. 2013) (email addresses stolen from electronic databases did not constitute “tangible property” and were excluded by policy’s exclusion of “electronic data”); Metro Brokers, Inc. v. Transp. Ins. Co., 603 F. App’x 833 (11th Cir. 2015) (holding that the insured’s first-party property policy’s coverage of “forgery” applied only to so-called traditional negotiable instruments and, therefore, there was no coverage for the fraudulent electronic transfer of money from the insured’s client’s escrow accounts); Greco & Traficante v. Fid. & Guar. Ins. Co., 2009 Cal. App. Unpub. LEXIS 636, at *12–13 (Ct. App. Jan. 26, 2009) (data lost due to power outage that did not damage physical media such as disks or 16–8 © Practising Law Institute Insurance Coverage for Data Breaches § 16:2.1 broader definition of “physical damage” and held that data itself constitutes physical property.25 In addition, various cases have held that the inability to use a computer due to damaged data may constitute a “loss of use” and thus covered property damage under a first-party policy,26 at least in the absence of an applicable exclusion of wear and tear or a latent defect.27 While decisions have found coverage for lost or damaged data as property damage under traditional first-party property policies, 28 many insurers have responded by taking steps to exclude electronic 25. 26. 27. 28. computers was not covered by a first-party property policy); Ward Gen. Servs., Inc. v. Emp’rs Fire Ins. Co., 7 Cal. Rptr. 3d 844 (Ct. App. 2003) (data loss due to a computer crash and human error did not constitute a loss of tangible property under a first-party policy). See, e.g., NMS Servs., Inc. v. Hartford, 62 F. App’x 511, 515 (4th Cir. 2003) (concurring opinion by Judge Widener stated that data erased by a hacker was a “direct physical loss”); Landmark Am. Ins. Co. v. Gulf Coast Analytical Labs., Inc., 2012 U.S. Dist. LEXIS 45184 (M.D. La. Mar. 26, 2012) (electronic data, while not tangible, is physical, and therefore susceptible to “direct, physical ‘loss or damage’”); Se. Mental Health Ctr., Inc. v. Pac. Ins. Co., 439 F. Supp. 2d 831 (W.D. Tenn. 2006) (firstparty property policy covered loss of use of a computer as “property damage” after loss of stored programming information and configurations); Am. Guar. & Liab. Ins. Co. v. Ingram Micro, 2000 U.S. Dist. LEXIS 7299 (D. Ariz. Apr. 18, 2000) (reasoning, based on an analysis of state and federal criminal statutes, that the loss of data constitutes physical damage under first-party business interruption policy); S. Cent. Bell Tel. Co. v. Barthelemy, 643 So. 2d 1240, 1244 (La. 1994) (electronic software data is physical); Comput. Corner, Inc. v. Fireman’s Fund Ins. Co., 46 P.3d 1264, 1266 (N.M. Ct. App. 2002) (computer data is physical, and its loss is covered under thirdparty policy). See, e.g., Se. Mental Health Ctr., Inc. v. Pac. Ins. Co., 439 F. Supp. 2d 831 (W.D. Tenn. 2006) (“property damage” includes not only “physical destruction or harm of computer circuitry, but also loss of access, loss of use, and loss of functionality,” so a first-party property policy covered loss of use of a computer after loss of stored programming information and configurations); Lambrecht & Assocs., Inc. v. State Farm Lloyds, 119 S.W.3d 16, 23–24 (Tex. App. 2003) (loss of use of computers, as well as loss of data, constituted a physical loss and fell within the scope of policy coverage); Metalmasters of Minn., Inc. v. Liberty Mut. Ins. Co., 461 N.W.2d 496, 502 (Minn. Ct. App. 1990) (data loss was covered by first-party property policy because computer tapes themselves were physically damaged in flood). See, e.g., GF&C Holding Co. v. Hartford Cas. Ins. Co., No. 11-cv-00236, 2013 U.S. Dist. LEXIS 38669, at *9–10 (D. Idaho Mar. 15, 2013) (finding property damage where insured’s hard drives failed, but holding coverage unavailable where exclusion provided that insurer “will not pay for physical loss or physical damage caused by or resulting from . . . wear and tear . . . [or] latent defect”). See supra notes 25–26. (Proskauer, 2d ed., 11/16) 16–9 © Practising Law Institute § 16:2.1 PROSKAUER ON PRIVACY data from the definition of tangible property.29 Indeed, the Insurance Services Office amended the definition of property damage in 2001 to specifically omit coverage for “electronic data”30 and, in 2004, added an exclusion for “[d]amages arising out of the loss of, loss of use of, damage to, corruption of, inability to access, or inability to manipulate electronic data.”31 Therefore, first-party property policies currently available in the market often do not typically provide coverage for data breaches unless computer hardware has been physically damaged.32 [B] Third-Party CGL Policies: Coverage for Property Damage Claims Courts have similarly been mixed in deciding whether data losses constitute covered property damage in the context of third-party CGL policies. In some cases, the courts have found that liability based on loss of data does not trigger coverage.33 For example, in America 29. 30. 31. 32. 33. See, e.g., RVST Holdings, LLC v Main St. Am. Assurance Co., 136 A.D.3d 1196 (N.Y. App. Div. 3d Dep’t 2016) (denying coverage for third-party claim arising out of data breach, reasoning that the policy provided that “electronic data is not tangible property” and excluded “[d]amages arising out of the loss of . . . electronic data”); Liberty Corp. Capital, 937 F. Supp. 2d at 901 (no coverage for misappropriation of email addresses from electronic databases based on finding that customer email list “property” does not fall within definition of “tangible property” and also excluded under electronic data exclusion); Recall Total Info. Mgmt. v. Fed. Ins. Co., 2012 Conn. Super. LEXIS 227 (Super. Ct. Jan. 17, 2012), aff ’d, 83 A.3d 664 (Conn. App. Ct.), aff ’d, 115 A.3d 458 (Conn. 2015) (because electronic data was specifically excluded, coverage did not exist under CGL and umbrella policies for notification and other costs incurred when unencrypted data tapes containing personal information fell from the back of a truck and were stolen; court found that damage arose from the data, not the actual tapes); Ins. Servs. Office, Inc., Commercial Liability Umbrella Form 00 01 12 04 § V(18)(b) (2004), LEXIS, ISO Policy Forms (“For the purposes of this insurance, electronic data is not tangible property.”). See generally 3 MARTHA A. KERSEY, NEW APPLEMAN ON INSURANCE LAW LIBRARY EDITION § 18.02[4][a] (2015) (standard CGL policy form now defines electronic data and specifically excludes it from the definition of property damage). See, e.g., Jeff Woodward, The 2001 ISO CGL Revision, INT ’L RISK MGMT. INST., INC. (Jan. 2002), www.irmi.com/articles/expert-commentary/the2001-iso-cgl-revision. See, e.g., Jeff Woodward, The 2004 ISO CGL Policy, INT ’L RISK MGMT. INST., INC. (Apr. 2004), www.irmi.com/articles/expert-commentary/the2004-iso-cgl-policy. See, e.g., Greco & Traficante v. Fid. & Guar. Ins. Co., 2009 Cal. App. Unpub. LEXIS 636, at *12–13 (Ct. App. Jan. 26, 2009) (because computer and disks were not damaged, data loss was not covered by a first-party property policy). See, e.g., Am. Online, Inc. v. St. Paul Mercury Ins. Co., 347 F.3d 89 (4th Cir. 2003) (discussed in following text); State Auto Prop. & Cas. Ins. Co. v. Midwest Computs. & More, 147 F. Supp. 2d 1113, 1116 (W.D. Okla. 2001) (reasoning that computer data is not tangible property). 16–10 © Practising Law Institute Insurance Coverage for Data Breaches § 16:2.1 Online, Inc. v. St. Paul Mercury Insurance Co.,34 the Fourth Circuit concluded that damage to and loss of use of customers’ data and software were not covered under a CGL policy because there was no damage to “tangible property” under the definition of “property damage.”35 The court reasoned that computer data was “an abstract idea in the minds of the programmer and the user,” so loss or damage to software or data was “not damage to the hardware, but to the idea.”36 Other courts have applied a broader definition of “physical damage” and held that data constitutes physical property.37 For example, in Computer Corner, Inc. v. Fireman’s Fund Insurance Co., the court reasoned that because computer data “was physical, had an actual physical location, occupied space and was capable of being physically damaged and destroyed,” that lost data was covered under a CGL policy.38 In addition, courts have held that an alleged “loss of use” may constitute covered property damage under a CGL policy, where there is appropriate policy wording.39 A leading authority in this area is the decision of the U.S. Court of Appeals for the Eighth Circuit in Eyeblaster, Inc. v. Federal Insurance Co.40 In that case, Eyeblaster, an Internet advertising company, sought coverage under two policies, a general liability policy and an information and network technology errors and omissions liability policy, for claims alleging that its products had caused damage to a user ’s computer.41 After stating that the plain meaning of “tangible property” includes computers,42 the Eighth Circuit ruled that the claims against Eyeblaster fell within the CGL policy because the underlying suit repeatedly alleged a “loss of use” of a computer.43 The court found coverage under these circumstances even though the CGL policy excluded 34. 35. 36. 37. 38. 39. 40. 41. 42. 43. Am. Online, Inc. v. St. Paul Mercury Ins. Co., 347 F.3d 89 (4th Cir. 2003). Id. at 96. Id. at 95–96. Comput. Corner, Inc. v. Fireman’s Fund Ins. Co., 46 P.3d 1264 (N.M. Ct. App. 2002) (discussed infra); see also NMS Servs., Inc. v. Hartford, 62 F. App’x 511, 515 (4th Cir. 2003) (Widener, J. concurring) (stating that data erased by a hacker was a “direct physical loss”); Eyeblaster, Inc. v. Fed. Ins. Co., 613 F.3d 797 (8th Cir. 2010) (discussed in following paragraph). Computer Corner, 46 P.3d at 1266. See, e.g., State Auto Prop. & Cas. Ins. Co. v. Midwest Computs. & More, 147 F. Supp. 2d 1113, 1116 (W.D. Okla. 2001) (computer data was not tangible property, but a computer is tangible property so loss of use of that property constitutes property damage where the policy includes coverage for “loss of use of tangible property”). Eyeblaster, Inc. v. Fed. Ins. Co., 613 F.3d 797 (8th Cir. 2010). Id. at 799. Id. at 802. Id. (Proskauer, 2d ed., 11/16) 16–11 © Practising Law Institute § 16:2.2 PROSKAUER ON PRIVACY electronic data from the definition of “tangible property.”44 According to the court, the alleged “loss of use” of the physical computer hardware implicated coverage under the policy.45 Under this approach, though the loss of data itself may not be covered because it fails to qualify as damage to tangible property, the loss of use of computer hardware due to a loss of data may allow coverage. Although some decisions find that lost or corrupted data or loss of use constitutes property damage,46 evolving policy definitions and exclusions in CGL policies now often state specifically that electronic data is not tangible property covered under property damage provisions or exclude damages arising out of the loss of use of electronic data. 47 As a result, policyholders seeking coverage for a data loss under the property damage provisions of a traditional CGL policy may find it increasingly difficult to obtain coverage. While insureds confronted with a loss should evaluate the availability of coverage under property damage provisions of CGL policies, another successful avenue for coverage of data breach and privacy claims—at least in the liability context—is often found in the coverage for personal and advertising injury. § 16:2.2 CGL Coverage for Personal and Advertising Injury Claims CGL policies typically provide liability coverage for damages arising from claims against the insured that involve bodily injury, property damage, advertising injury, and personal injury. While insurers continue to add exclusions in an effort to restrict insurance for cyber claims, 48 in addition to property damage coverage discussed 44. 45. 46. 47. 48. Id. Id. E.g., Se. Mental Health Ctr., Inc. v. Pac. Ins. Co., 439 F. Supp. 2d 831, 838 (W.D. Tenn. 2006); Am. Guar. & Liab. Ins. Co. v. Ingram Micro, Inc., 2000 U.S. Dist. LEXIS 7299, at *10 (D. Ariz. Apr. 18, 2000); Eyeblaster, 613 F.3d at 802. See, e.g., Eyeblaster, 613 F.3d at 802 (definition of “tangible property” excludes “any software, data or other information that is in electronic form”); Ins. Servs. Office, Inc., Commercial Liability Umbrella Form CU 00 01 12 04 § V(18)(b) (2004), available at LEXIS, ISO Policy Forms (“For the purposes of this insurance, electronic data is not tangible property.”); Ins. Servs. Office, Inc., Commercial Liability Umbrella Coverage Form CU 00 01 12 04 § A.2.t (2004), available at LEXIS, ISO Policy Forms (excluding “damages arising out of the loss of, loss of use of, damage to, corruption of, inability to access or inability to manipulate electronic data”). The April 2013 revisions to the ISO CGL form introduced a new endorsement entitled “Amendment of Personal and Advertising Injury Definition.” This endorsement explicitly excludes the right of privacy provision from paragraph 14.e. of the Personal and Advertising Injury definitions section 16–12 © Practising Law Institute Insurance Coverage for Data Breaches § 16:2.2 above,49 coverage for data breaches and privacy-related claims may exist under CGL policy provisions insuring “personal injury ” and “advertising injury,” particularly where they include coverage for liability arising from “oral or written publication, in any manner, of material that violates a person’s right of privacy.”50 Personal and advertising injury provisions often limit coverage to specifically enumerated offenses like malicious prosecution or copyright infringement.51 For coverage of data breaches, the most important of these enumerated offenses is usually “oral or written publication, in any manner, of material that violates a person’s right of privacy.”52 Some policies and courts limit coverage for violation of a right to privacy to injuries caused by an insured’s “advertising” 49. 50. (“[o]ral or written publication, in any manner, of material that violates a person’s right of privacy”). Ins. Servs. Office, Inc., Commercial Liability Form CG 24 13 04 13 (2013), available at LEXIS, ISO Policy Forms; see also section 16:2.1[B], supra. See section 16:2.1, supra. Two illustrative provisions are as follows: “Personal injury” is defined as an injury, other than “bodily injury,’” arising out of certain enumerated offenses including: 1) false arrest, detention or imprisonment, 2) malicious prosecution, 3) wrongful eviction from, wrongful entry into, or invasion of the right of private occupancy of a room, dwelling or premises that a person occupies by or on behalf of its owner, and lord or lessor, 4) oral or written publication of material that slanders or libels a person or organization or disparages a person’s or organization’s goods, products, or services, or 5) oral or written publication of material that violates a person’s right of privacy.” 9A STEVEN PLITT (emphasis added). ET AL., COUCH ON INSURANCE § 129:7 (3d ed. 2014) “Advertising injury” is defined as injury arising out of certain enumerated offenses, including: 1) oral or written publication of material that slanders or libels a person or organization or disparages a person’s or organization’s goods, products, or services; 2) oral or written publication of material that violates a person’s right of privacy; 3) misappropriation of advertising ideas or style of doing business; or 4) infringement of copyright, title, or slogan. 51. 52. Id. § 129:8 (emphasis added); see, e.g., Zurich Am. Ins. Co. v. Fieldstone Mortg. Co., 2007 U.S. Dist. LEXIS 81570, at *3–4 (D. Md. Oct. 26, 2007). But see note 48, supra. 9A STEVEN PLITT ET AL., COUCH ON INSURANCE § 129:8 (3d ed. 2014); see note 50, supra. See, e.g., Ins. Servs. Office, Inc., Commercial General Liability Form CG 00 01 10 01, § V(14)(e) (2008), available at LEXIS, ISO Policy Forms; notes 48–49, supra; see also Hartford Cas. Ins. Co. v. Corcino & Assocs., 2013 U.S. Dist. LEXIS 152836 (C.D. Cal. Oct. 7, 2013) (holding that a hospital data breach was covered under the CGL policy provision that includes (Proskauer, 2d ed., 11/16) 16–13 © Practising Law Institute § 16:2.2 PROSKAUER ON PRIVACY activity,53 but many include this coverage for any publication.54 When seeking insurance under the personal or advertising injury clauses of a traditional CGL policy, insurers will often contest coverage based on arguments that the policyholder ’s actions did not amount to a publication of information or that a third party’s right to privacy was not implicated.55 53. 54. 55. “electronic publication of material that violates a person’s right of privacy”); but see ISO Form CG 24 13 04 13 (2012) (specifically excluding violation of right to privacy as an enumerated offense), quoted in note 46, supra. 3 ALLAN D. WINDT, INSURANCE CLAIMS AND DISPUTES § 11:29 (6th ed. 2015) (“modern liability policies typically include a distinct coverage part for advertising injury caused by an offense committed both during the policy period and in the course of advertising the insured’s goods or services”) (emphasis added); see also Hyundai Motor Am. v. Nat’l Union Fire Ins. Co., 600 F.3d 1092, 1098 (9th Cir. 2010) (holding “advertising” means “widespread promotional activities usually directed to the public at large,” but “does not encompass ‘solicitation’”) (citation omitted) (emphasis in original); Simply Fresh Fruit v. Cont’l Ins. Co., 94 F.3d 1219, 1223 (9th Cir. 1996) (“under the policy, the advertising activities must cause the injury—not merely expose it”); Lexmark Int’l, Inc. v. Transp. Ins. Co., 327 Ill. App. 3d 128, 137 (App. Ct. 1st Dist. 2001) (while there is no generally accepted definition of advertising activity in the context of “personal and advertising injury” insurance coverage, the court found it generally referred to “the widespread distribution of promotional material to the public at large”); Phx. Am., Inc. v. Atl. Mut. Ins. Co., 2001 WL 1649243, at *6 (Cal. Ct. App. Dec. 24, 2001) (unpublished) (court defined “advertising” for purposes of CGL insurance coverage as “the act of calling public attention to one’s product through widespread promotional activities”); see also Air Eng’g, Inc. v. Indus. Air Power, LLC, 828 N.W.2d 565, 572 (Wis. Ct. App. 2013) (court defined an “advertising idea” as “an idea for calling public attention to a product or business, especially by proclaiming desirable qualities so as to increase sales or patronage”). See, e.g., Ins. Servs. Office, Inc., Commercial General Liability Coverage Form CG 00 01 12 07, § V(14) (2008), available at LEXIS, ISO Policy Forms (indicating that both personal injury and advertising injury can arise from oral or written publication that violates a person’s right to privacy); Am. Family Mut. Ins. Co. v. C.M.A. Mortg., Inc., 2008 U.S. Dist. LEXIS 30233, at *16 (S.D. Ind. Mar. 31, 2008) (covering “oral or written publication, in any manner, of material that violates a person’s right of privacy”; the “in any manner” language “le[ft] no room for equivocation” in holding that the insurer had a duty to defend the underlying Fair Credit Report Act violation case based on a solicitation letter, including with respect to statutory damages) (emphasis added); see also Evanston Ins. Co. v. Gene by Gene Ltd., 155 F. Supp. 3d 706 (S.D. Tex. 2016) (granting judgment to insured and finding that insurer must provide defense under coverage for advertising injury and personal injury where company allegedly published results of customers’ DNA tests without consent, despite allegation that breach violated Genetic Privacy Act). See section 16:2.2[A]–[B], infra. 16–14 © Practising Law Institute Insurance Coverage for Data Breaches § 16:2.2 [A] Publication Requirement Particularly where advertising is required for coverage, insurers have frequently challenged whether the event implicating coverage constitutes a “publication” of information. The importance of the publication requirement was recently addressed in Recall Total Information Management v. Federal Insurance Co., where the insured lost computer tapes containing sensitive information of thousands of its clients’ employees.56 In that case, the court held that there was no publication since the insured could not establish that the information contained on the lost tapes was ever accessed by anyone, which the court held is a “necessary prerequisite to the communication or disclosure of personal information.” 57 Where there is dissemination, however, the issue becomes how widely that information must be disseminated in order to constitute publication. A leading case in this area is Netscape Communications Corp. v. Federal Insurance Co.58 There, the underlying complaint alleged that Netscape had intercepted and internally disseminated private online communications.59 The court held that internal disclosures of intercepted computer information and communications triggered coverage because the policy language covered disclosure to “any” person or organization.60 Therefore, even though the alleged disclosure was confined within the company, coverage was triggered.61 As illustrated by Netscape, the publication requirement has generally required a rather limited showing by those seeking coverage. While the cases are not uniform on this point, most courts hold that an insured need not disclose information widely or externally to satisfy the requirement of publication in cases involving data breaches or unauthorized disclosure of private information.62 Courts have held 56. 57. 58. 59. 60. 61. 62. Recall Total Info. Mgmt. v. Fed. Ins. Co., 83 A.3d 664, 672–73 (Conn. App. Ct. 2014) (involving a CGL policy that covered “personal injury,” which was defined as “injury, other than bodily injury, property damage or advertising injury, caused by an offense of . . . electronic, oral, written or other publication of material that . . . violates a person’s right to privacy”), aff ’d, 115 A.3d 458 (Conn. 2015). Id.; see also Defender Sec. Co. v. First Mercury Ins. Co., 803 F.3d 327 (7th Cir. 2015) (no coverage for alleged secret recording of sales calls because the recording of a phone call, without more, is insufficient to constitute a publication). Netscape Commc’ns Corp. v. Fed. Ins. Co., 343 F. App’x 271 (9th Cir. 2009). Id. at 272. Id. Id. Compare Netscape, 343 F. App’x at 271 (publication requirement of policy was satisfied where disclosures were internal to the company), Encore (Proskauer, 2d ed., 11/16) 16–15 © Practising Law Institute § 16:2.2 PROSKAUER ON PRIVACY that disclosure to a single person can satisfy the publication requirement for advertising injury coverage. 63 Even where a publication must be a dissemination to the “public,” courts have found coverage in cases involving widely disseminated information, like sending thousands of fax advertisements,64 or posting information to the 63. 64. Receivable Mgmt., Inc. v. Ace Prop. & Cas. Ins. Co., 2013 U.S. Dist. LEXIS 93513, at *31 n.17 (S.D. Ohio July 3, 2013) (internal transmission of information within a corporation constitutes publication), Norfolk & Dedham Mut. Fire Ins. Co. v. Cleary Consultants, Inc., 958 N.E.2d 853 (Mass. App. Ct. 2011) (finding that an insured’s alleged transmittal of an employee’s private information to her co-workers constitutes “publication” under a standard CGL policy), Virtual Bus. Enters., LLC v. Md. Cas. Co., 2010 Del. Super. LEXIS 141 (Super. Ct. Apr. 9, 2010) (finding transmittal of letters to a handful of former clients constituted “publication”), Zurich Am. Ins. Co. v. Fieldstone Mortg. Co., 2007 U.S. Dist. LEXIS 81570, at *14 (D. Md. Oct. 26, 2007) (“Of the circuits to examine ‘publication’ in the context of an ‘advertising injury’ provision, the majority have found that the publication need not be to a third party.”) (citation omitted), and Tamm v. Hartford Fire Ins. Co., 16 Mass. L. Rep. 535 (Super. Ct. July 10, 2003) (accessing private emails and discussing contents with three people constituted publication for purposes of CGL coverage), with OneBeacon Am. Ins. Co. v. Urban Outfitters, Inc., 625 F. App’x 177, 180 (3d Cir. 2015) (“‘publication’ requires dissemination to the public”), Beard v. Akzona, Inc., 517 F. Supp. 128, 133 (E.D. Tenn. 1981) (finding that disclosure to only five persons was not sufficient to constitute publication), and C.L.D. v. Wal-Mart Stores, Inc., 79 F. Supp. 2d 1080, 1082–84 (D. Minn. 1999) (finding disclosure to three people insufficient publicity to warrant a claim for invasion of privacy). See, e.g., Zurich Am. Ins. Co. v. Fieldstone Mortg. Co., 2007 U.S. Dist. LEXIS 81570, at *17 (D. Md. Oct. 26, 2007) (holding that sending a person’s credit report back to that particular person in the form of a prescreened letter for a mortgage constituted publication); Pietras v. Sentry Ins. Co., 2007 U.S. Dist. LEXIS 16015, at *9–10 (N.D. Ill. Mar. 6, 2007) (recognizing that publication of a consumer ’s credit information back to that one particular consumer can constitute publication); Motorist Mut. Ins. Co. v. Dandy-Jim, Inc., 912 N.E.2d 659, 666 (Ohio Ct. App. 2009) (insured’s publication need not be made to person other than one whose privacy rights were violated); Hill v. MCI WorldCom Commc’ns, Inc., 141 F. Supp. 2d 1205, 1213 (S.D. Iowa 2001) (communication to one person constituted publicity due to confidential relationship between plaintiff and third party). Penzer v. Transp. Ins. Co., 29 So. 3d 1000 (Fla. 2010) (finding coverage where sending thousands of unsolicited fax advertisements fit the “broad definition of ‘publication’ because it constitutes a communication of information disseminated to the public and it is ‘the act or process of issuing copies . . . for general distribution to the public’”); Valley Forge Ins. Co. v. Swiderski Elecs., Inc., 860 N.E.2d 307 (Ill. 2006) (finding coverage where faxing unsolicited advertisements fit plain and ordinary sense of the word “publication” “both in the general sense of communicating information to the public and in the sense of distributing copies of the advertisements to the public”), aff ’d, 2016 WL 1399517 (4th Cir. Apr. 11, 2016). 16–16 © Practising Law Institute Insurance Coverage for Data Breaches § 16:2.2 Internet regardless of whether there is any evidence that the posting was actually read.65 At least one court has held that disclosure to a recording device can constitute publication.66 Although the publication requirement has been interpreted to apply to a broad range of potential disclosures, 67 some courts still require a definable disclosure to a party other than the person alleging the unauthorized disclosure.68 In a terse unpublished opinion,69 a New York state court potentially added an additional perspective to the publication requirement. The court held that there was no coverage under a policy’s personal and advertising injury provision for lawsuits related to a breach of data belonging to users of the company’s online gaming product.70 The court concluded that the CGL policy only provides coverage for publication of information by the policyholder and because hackers— not the company—had published the personal information at issue, 65. 66. 67. 68. 69. 70. But see Defender Sec. Co. v. First Mercury Ins. Co., 803 F.3d 327 (7th Cir. 2015) (no coverage for alleged secret recording of sales calls because the recording of a phone call, without more, is insufficient to constitute a publication). Travelers Indem. Co. of Am. v. Portal Healthcare Sols., LLC, 35 F. Supp. 3d 765 (E.D. Va. 2014) (holding that “[p]ublication occurs when information is ‘placed before the public,’ not when a member of the public reads the information placed before it”). See Encore Receivable Mgmt. v. Ace Prop. & Cas. Ins. Co., 2013 U.S. Dist. LEXIS 93513, at *29 (S.D. Ohio July 3, 2013) (finding publication by call center recording of conversation without consent); see also Complaint, InterContinental Hotels Grp. Res., Inc. v. Zurich Am. Ins. Co., No. 14-cv04779-YGR (N.D. Cal. Oct. 27, 2014) (seeking a declaration of coverage for underlying putative class action alleging that the insured recorded customer service calls in violation of California’s Invasion of Privacy Act). See notes 62–63, supra, and 91–93, infra. But see infra note 68. See Creative Hospitality Ventures, Inc. v. E.T. Ltd., Inc., 444 F. App’x 370 (11th Cir. 2011) (issuance of a receipt containing sensitive credit card information to a customer did not constitute publication, because it did not involve “dissemination of information to the general public”); Whole Enchilada Inc. v. Travelers Prop. Cas. Co. of Am., 581 F. Supp. 2d 677 (W.D. Pa. 2008) (personal and advertising injury provisions of policy were not triggered by alleged violations of the Fair and Accurate Credit Transactions Act where credit card numbers were printed on sales receipts and handed back to the customers themselves); see also Defender Sec. Co. v. First Mercury Ins. Co., 803 F.3d 327 (7th Cir. 2015) (no coverage for alleged secret recording of sales calls because the recording of a phone call, without more, is insufficient to constitute a publication). But see note 63, supra. Zurich Am. Ins. Co. v. Sony Corp. of Am., 2014 N.Y. Misc. LEXIS 5141 (Sup. Ct. Feb. 21, 2014); see also note 72, infra. Id. (Proskauer, 2d ed., 11/16) 16–17 © Practising Law Institute § 16:2.2 PROSKAUER ON PRIVACY there was no coverage.71 The policyholder appealed the trial court’s ruling, but two months after a New York appeals panel heard the appeal, the case settled without a ruling.72 [B] Right to Privacy As an Enumerated Offense While the contours of the publication requirement appear relatively settled, many policies, particularly in recent years, do not include violation of a right to privacy as an enumerated offense or, where they do, have other exclusions that preclude coverage for data breaches. 73 Absent inclusion of infringement of a right to privacy as an enumerated offense, the advertising and personal injury sections of most CGL policies may not provide coverage for data theft or breach. Even where infringement of a right to privacy is included as an enumerated offense, insurers and insureds have often had vigorous disputes with respect to whether these provisions encompass data breaches. In general, courts have explained that the right to privacy contains two distinct rights—the right to seclusion and the right to secrecy.74 Some courts have used this distinction to conclude that only claims associated with a right to secrecy are insured under policy provisions covering personal and advertising injury.75 However, others find that any ambiguity associated with the concept of a “right to privacy” in 71. 72. 73. 74. 75. Id. Young Ha, Sony, Zurich Reach Settlement in PlayStation Data Breach Case in New York, INS. J., May 1, 2015, www.insurancejournal.com/news/ east/2015/05/01/366600.htm. See, e.g., ISO Form CG 00 01 10 01 (2008) (excluding violation of right to privacy as an enumerated offense), quoted in note 16, supra; Business Liability Coverage Form BP 0100 01 04, Additional Exclusions § 2 (2004), IRMI.com, www.irmi.com/online/frmcpi/sc0000bp/chaaisbp/01000104. pdf (excludes from policy coverage any direct or indirect loss or loss of use caused by a computer virus or computer hacking). See, e.g., Pietras v. Sentry Ins. Co., No. 06 C 3576, 2007 U.S. Dist. LEXIS 16015, at *7–8 (N.D. Ill. Mar. 6, 2007) (privacy interests in seclusion and secrecy are both implicated by a “right to privacy”); ACS Sys., Inc. v. St. Paul Fire & Marine Ins. Co., 53 Cal. Rptr. 3d 786 (Ct. App. 2007) (CGL policy covers liability for violations of a privacy right of “secrecy” and not a privacy right of seclusion). See, e.g., Md. Cas. Co. v. Express Prods., 2011 U.S. Dist. LEXIS 108048, at *53 (E.D. Pa. Sept. 22, 2011) (concluding the right to secrecy the only right protected under “personal and advertising injury” of the CGL policies); ACS Sys., Inc. v. St. Paul Fire & Marine Ins. Co., 53 Cal. Rptr. 3d 786 (Ct. App. 2007) (a CGL policy covers liability for violations of a privacy right of “secrecy” and not a privacy right of seclusion); Res. Bankshares Corp. v. St. Paul Mercury Ins. Co., 407 F.3d 631 (4th Cir. 2005) (fax advertisements implicate a privacy right of seclusion, while CGL policy coverage relates only to “secrecy” privacy); see also note 81, infra, and accompanying text. 16–18 © Practising Law Institute Insurance Coverage for Data Breaches § 16:2.2 CGL coverage is reason to apply a broad definition covering both types of violations.76 Three types of insurance claims that have been heavily litigated under the personal and advertising provisions of CGL policies involve violations of the Telephone Consumer Protection Act (TCPA),77 the Fair Credit Reporting Act78 (FCRA), and state statutes precluding dissemination of ZIP codes.79 [B][1] Telephone Consumer Protection Act Cases Cases asserting violations of the TCPA often involve the sending of unsolicited fax advertisements to third-party fax machines 80 or, more recently, unsolicited text messages to cellular phones.81 In fax blast 76. 77. 78. 79. 80. 81. See Owners Ins. Co. v. European Auto Works, Inc., 695 F.3d 814, 821 (8th Cir. 2012) (“The policies’ reference to violating a ‘right of privacy’ thus encompasses the intrusion on seclusion caused by a TCPA violation for sending unsolicited fax advertisements[.]”); Pietras, 2007 U.S. Dist. LEXIS 16015 (“right to privacy” implicates both seclusion and secrecy); Penzer v. Transpor. Ins. Co., 29 So. 3d 1000 (Fla. 2010) (plain meaning of “right to privacy” includes any claim for privacy—whether involving a right to secrecy or seclusion); Park Univ. Enters. v. Am. Cas. Co., 442 F.3d 1239 (10th Cir. 2006) (holding that the dual meaning of the word “privacy” created an ambiguity in the policy and that it was reasonable to construe “privacy” to include the right to seclusion); State Farm Fire & Cas. Co. v. Kapraun, 2014 Mich. App. LEXIS 1276 (Ct. App. July 3, 2014) (rejecting insurer ’s argument that “‘right of privacy’ should be limited to the contours of Michigan tort law and, further, should only encompass a person’s right to secrecy”). Telephone Consumer Protection Act of 1991 (TCPA), 47 U.S.C. § 227 (2010), discussed in section 16:2.2[B][1], infra. Fair Credit Reporting Act (FCRA), 15 U.S.C. § 1681 et seq., discussed in section 16:2.2[B][2], infra. See, e.g., OneBeacon Am. Ins. Co. v. Urban Outfitters, Inc., 625 F. App’x 177 (3d Cir 2015), discussed in section 16:2.2[B][3], infra. The Illinois Supreme Court recently issued a significant decision on coverage of violations under the TCPA. Standard Mut. Ins. Co. v. Lay, 989 N.E.2d 591 (Ill. 2013). In that case, the insurer denied coverage for the insured’s underlying TCPA action, arguing that the “TCPA-prescribed damages of $500 per violation constitute punitive damages, which ‘are not insurable as a matter of Illinois law and public policy.’” Id. at 595. However, the court held that TCPA damages are not punitive, reasoning that the statute’s purpose was “clearly” remedial in nature. Id. at 599–600. On remand, the Illinois Appellate Court held that the insurer must provide coverage to the insured for a settlement in a TCPA suit. Standard Mut. Ins. Co. v. Lay, 2 N.E.3d 1253 (Ill. App. Ct. 2014), leave to appeal denied by Standard Mut. Ins. Co. v. Lay, No. 117110, 2014 Ill. LEXIS 433 (Mar. 26, 2014). For further discussion of the Lay decision, see infra section 16:3.2[G], Definition of Loss. See, e.g., L.A. Lakers, Inc. v. Fed. Ins. Co., 2015 U.S. Dist. LEXIS 62159 (C.D. Cal. Apr. 17, 2015) (holding invasion of privacy exclusion applied to (Proskauer, 2d ed., 11/16) 16–19 © Practising Law Institute § 16:2.2 PROSKAUER ON PRIVACY cases, the distinction between the right to seclusion and the right to secrecy has been used to deny coverage where there was found to be a violation of one’s right to seclusion, but not of the right to secrecy. 82 Under the cases where the right to seclusion is violated by way of unsolicited faxes or text messages, but there is no accompanying violation of one’s interest in the secrecy of personal information, some courts hold there has been no violation of the right to privacy for insurance policy purposes.83 Other courts have stated that the term “privacy” is ambiguous and can be read to include both a right to secrecy and a right to seclusion.84 Under this latter view, any violation of a privacy right would implicate coverage. Many policies have begun to explicitly exclude violations of certain statutory actions as a result of this broadened judicial interpretation of coverage for personal injury offenses based on the right of privacy.85 Even here, courts have come to different conclusions as to whether 82. 83. 84. 85. bar coverage stemming from sending unsolicited text messages), appeal pending; Doctors Direct Ins., Inc. v. Bochenek, 38 N.E.3d 116 (Ill. App. Ct. 1st Dist. 2015) (holding no coverage for class action involving text messages under cyber claims endorsement of professional liability policy because claims not based on a privacy wrongful act); Nat’l Union Fire Ins. Co. of Pittsburgh, Pa. v. Papa John’s Int’l, Inc., 2014 U.S. Dist. LEXIS 90792 (W.D. Ky. July 3, 2014) (finding no coverage for unsolicited text messages sent in violation of the TCPA); see also Press Release, Fed. Commc’ns Comm’n, FCC Strengthens Consumer Protections Against Unwanted Calls and Texts (June 18, 2015), http://transition.fcc.gov/Daily_ Releases/Daily_Business/2015/db0619/DOC-333993A1.pdf (announcing increased protection under the TCPA against unwanted robo-calls and spam texts). See Cynosure, Inc. v. St. Paul Fire & Marine Ins. Co., 645 F.3d 1 (1st Cir. 2011) (holding that the policy referred unambiguously to “disclosure” of private third-party information, and not to “intrusion”; therefore the policy did not cover claims for the mere receipt of faxes); Res. Bankshares Corp. v. St. Paul Mercury Ins. Co., 407 F.3d 631 (4th Cir. 2005) (finding that fax advertisements implicate a privacy right of seclusion, while CGL policy coverage relates only to “secrecy” privacy); ACS Sys., Inc. v. St. Paul Fire & Marine Ins. Co., 53 Cal. Rptr. 3d 786 (Ct. App. 2007) (holding that advertising injury provisions of a CGL policy did not cover ACS’s liability for sending unsolicited fax advertisements because the policy covered only privacy right of “secrecy” and not a privacy right of seclusion); see also notes 75–76, supra, and accompanying text. See id.; see also L.A. Lakers, 2015 U.S. Dist. LEXIS 62159; Doctors Direct, 38 N.E.3d 116. See note 76, supra. Commercial General Liability Form CG 00 01 12 07, Section I, Coverage B § (2)(P) (2008), available at LEXIS, ISO Policy Forms (excludes from coverage “Distribution of Materials in Violation of Statutes”). In November 2013, ISO made available a new endorsement entitled “Access or Disclosure of Confidential or Personal Information and Data Related Liability—with Limited Bodily Injury Exception.” Ins. Servs. Office, Inc., Commercial General Liability Form CG 21 07 05 14 (2013), available at 16–20 © Practising Law Institute Insurance Coverage for Data Breaches § 16:2.2 exclusions related to the violation of various statutes actually apply to bar coverage.86 Even in cases where statutory exclusions have been held to bar insurance for statutory claims, courts sometimes allow coverage for causes of action that would exist in the absence of the relevant statute.87 86. 87. LEXIS, ISO policy forms (excluding coverage for “damages arising out of: (1) any access to or disclosure of any person’s or organization’s confidential or personal information, including patents, trade secrets, processing methods, customer lists, financial information, credit card information, health information, or any other type of nonpublic information; (2) or loss of, loss of use of, damage to, corruption of, inability to access, or inability to manipulate electronic data”); see also Nat’l Union Fire Ins. Co. v. Coinstar, Inc., 2014 U.S. Dist. LEXIS 31441, at *5 (W.D. Wash. Feb. 28, 2014) (policy contained an exclusion relating to the violation of statutes banning the sending, transmitting, or communicating any material or information); Nationwide Mut. Ins. Co. v. Harris Med. Assocs., LLC, 973 F. Supp. 2d 1045, 1050 (E.D. Mo. Sept. 23, 2013) (insurance policy contained a Violation of Consumer Protection Statutes exclusion for “‘any action or omission that violates or is alleged to violate’ the TCPA, or any ‘statute . . . that addresses, prohibits or limits the electronic printing, dissemination, disposal, sending, transmitting, communicating or distribution of material or information’”); G.M. Sign, Inc. v. State Farm Fire & Cas. Co., 18 N.E.3d 70, 74 (Ill. Ct. App. 2014) (“Distribution of Material in Violation of Statutes Exclusion” applied to “Bodily injury, property damage, personal injury, or advertising injury arising directly or indirectly out of any action or omission that violates or is alleged to violate [t]he Telephone Consumer Protection Act (TCPA).”) (emphasis added). Compare Evanston Ins. Co. v. Gene by Gene Ltd., 155 F. Supp. 3d 706 (S.D. Tex. 2016) (policy excluded violations of TCPA, CAN-SPAM, and any other statute that “prohibits or limits the sending, transmitting, communication or distribution of information or other material,” but it did not apply to bar coverage of Alaska Genetic Privacy Act claims), Hartford Cas. Ins. Co. v. Corcino & Assocs., 2013 U.S. Dist. LEXIS 152836 (C.D. Cal. Oct. 7, 2013) (holding that the statutory exclusion for “Personal And Advertising Injury . . . [a]rising out of the violation of a person’s right to privacy created by any state or federal act” did not apply to bar coverage for the insured hospital’s data breach because at common law, medical records have long been deemed confidential and private, and because the legislative history of the relevant statutes shows that they were not enacted to create new privacy rights), with Scottsdale Ins. Co. v. Stergo, 2015 U.S. Dist. LEXIS 127268 (N.D. Ill. Sept. 23, 2015) (holding that the exclusion for “violation of statutes that govern emails, fax, phone calls or other methods of sending material or information” barred coverage for sending unsolicited junk fax advertisements), Nat’l Union Fire Ins. Co. v. Coinstar, Inc., 2014 U.S. Dist. LEXIS 31441 (W.D. Wash. Feb. 28, 2014) (holding that the “Violation of Statutes in Connection with Sending, Transmitting, or Communicating Any Material Or Information” exclusion applied to bar coverage when the plaintiffs alleged a violation of the Video Protection Privacy Act). See, e.g., Hartford Cas. Ins. Co. v. Corcino & Assocs., 2013 U.S. Dist. LEXIS 152836, at *11 (C.D. Cal. Oct. 7, 2013) (stating that the statutory (Proskauer, 2d ed., 11/16) 16–21 © Practising Law Institute § 16:2.2 PROSKAUER ON PRIVACY [B][2] Fair Credit Reporting Act Cases While fax blast cases may raise special issues about whether there is an invasion of a right to seclusion or a right to secrecy, FCRA cases typically involve disclosures of personal information that is asserted to be confidential. A leading case in this area is the decision of the federal court in Zurich American Insurance Co. v. Fieldstone Mortgage Co. 88 In that case, a mortgage company was alleged to have improperly accessed and used individual credit information, in violation of the FCRA, in order to provide “pre-screened” offers of mortgage services.89 The insurer denied coverage for the resulting claims.90 The court noted that the FCRA was enacted to ensure the protection of privacy rights and held that the insurer had a duty to defend against the FCRA claims because they fell under the “personal and advertising injury coverage” of the insured’s CGL policy.91 Like many privacy-related cases, coverage in the Fieldstone Mortgage case turned on whether the FCRA claim alleged a violation of a “right to privacy” and whether there had been publication of the information at issue. In analyzing the scope of the publication requirement to assess coverage, the court explicitly rejected the insurance company’s argument that “in order to constitute publication, the information that violates the right to privacy must be divulged to a third party.”92 Noting that a majority of circuits have rejected this argument,93 the court held that publication need not be to 88. 89. 90. 91. 92. 93. exclusion would not apply to damages alleged that would have occurred in the absence of the statutes); Nationwide Mut. Ins. Co. v. Harris Med. Assocs., LLC, 973 F. Supp. 2d 1045 (E.D. Mo. 2013) (holding that the Violation of Statues exclusion did not negate the potential for coverage for common claims); Axiom Ins. Managers, LLC v. Capitol Specialty Ins. Corp., 876 F. Supp. 2d 1005, 1015 (N.D. Ill. 2012) (holding that the Distribution of Material exclusion did not exclude coverage of common law claim). But see Big 5 Sporting Goods Corp. v. Zurich Am. Ins. Co., 635 F. App’x 351, 353–54 (9th Cir. 2015) (holding that common law claims that were not separate and apart from any statute violations were subject to the statutory exclusions); CE Design Ltd. v. Cont’l Cas. Co., 2016 WL 2342858 (Ill. App. Ct. May 2, 2016) (holding no coverage for common law claims because they arose from the same conduct that was the basis for the TCPA claim); Ill. Cas. Co. v. W. Dundee China Palace Rest., Inc., 49 N.E.3d 420 (Ill. App. Ct. 2015) (holding that there was no coverage because common law claims were merely a “rephrasing” of the TCPA conduct). Zurich Am. Ins. Co. v. Fieldstone Mortg. Co., 2007 U.S. Dist. LEXIS 81570 (D. Md. Oct. 26, 2007). Id. at *2. Id. at *4. Id. at *9, *11. Id. at *14 (citing Park Univ. Enters. v. Am. Cas. Co., 442 F.3d 1239, 1248–49, 1250 (10th Cir. 2006)). Id.; see also notes 62–68, supra. 16–22 © Practising Law Institute Insurance Coverage for Data Breaches § 16:2.2 a third party and that unauthorized access and use was all that was necessary to violate a privacy right for coverage purposes. 94 [B][3] “ZIP Code” Cases Another area of recent litigation has concerned the gathering of ZIP codes and personal information at the time of credit card purchases. A number of states have statutes that arguably relate to these practices, and several consumer class actions have been brought pursuant to these statutes or common law.95 For example, in One Beacon American Insurance Co. v. Urban Outfitters, the court rejected one of the insured’s claims for coverage on the ground that there was no allegation of public dissemination of information and publication required communication to the public at large.96 A second claim was rejected on the theory that receipt of unsolicited junk mail alleged a violation of the right to seclusion, not secrecy, and was therefore not within the right of privacy covered by the policy.97 While it found that a third claim was sufficiently disseminated to satisfy the publication requirement, the court nonetheless held that coverage was precluded by a statutory exclusion against collecting or recording information.98 A similar exclusion was applied by the court in Big 5 Sporting Goods Corp. v. Zurich American Insurance Co.,99 which also refused to find a common law claim outside the exclusion.100 94. 95. 96. 97. 98. 99. 100. Zurich Am. Ins. Co., 2007 U.S. Dist. LEXIS 81570, at *14, *17–18. See, e.g., OneBeacon Am. Ins. Co. v. Urban Outfitters, Inc., 625 F. App’x 177 (3d Cir. 2015); Retail Ventures, Inc. v. Nat’l Union Fire Ins. Co., 691 F.3d 821 (6th Cir. 2012). OneBeacon, 625 F. App’x at 180 (requiring publication to be to the “public at large”). But see supra notes 62–63. See id. at 182. Id. at 181–82 (citing the “Recording and Distribution of Material or Information in Violation of Law Exclusion,” which excluded “‘Personal and advertising injury’ arising directly or indirectly out of any action or omission that violates or is alleged to violate . . . [any] statute, ordinance or regulation . . . that addresses, prohibits or limits the . . . dissemination, . . . collecting, recording, sending, transmitting, communicating or distribution of material or information.”). But see supra notes 62–63 and 86–87. Big 5 Sporting Goods Corp. v. Zurich Am. Ins. Co., 635 F. App’x 351, 353 (9th Cir. 2015) (applying the distribution of material in violation of statutes exclusion to coverage for “‘[p]ersonal and [a]dvertising [i]njury’ arising directly or indirectly out of any action or omission that violates or is alleged to violate: [a]ny statute, ordinance or regulation, other than the TCPA or CAN-SPAM Act of 2003, that prohibits or limits the sending, transmitting, communicating or distribution of material or information”), aff’g 957 F. Supp. 2d 1135 (C.D. Cal. 2013). But see supra notes 86–87. 957 F. Supp. 2d at 1151 (holding that because the relevant privacy right was not based on common law and created by statute, coverage for the common law claim was barred by the distribution of material exclusion). (Proskauer, 2d ed., 11/16) 16–23 © Practising Law Institute § 16:2.3 PROSKAUER § 16:2.3 ON PRIVACY Other Coverages While most companies seeking coverage under traditional policy forms will assert claims under first-party property or third-party CGL policies, policyholders may also seek coverage for data or privacy breaches under other contracts in their insurance portfolio including D&O insurance, E&O policies, and Commercial Crime Policies. [A] Directors and Officers Liability Insurance D&O insurance is generally designed to cover losses arising from claims made during the policy period that allege wrongs committed by “directors and officers.”101 As such, this type of insurance may be limited to circumstances where an officer or director is sued directly in connection with a privacy breach—perhaps for lack of supervision or personal involvement in dissemination of confidential information. Some D&O policies, and similar policies available to not-for-profits or companies that are not publicly traded, also contain “entity” coverage, which provides insurance for certain claims against the entity itself. In many instances, “entity” coverage is limited to securities claims,102 but this is not always the case. Where entity coverage is broad, it may encompass liabilities for privacy breaches and other cyber risks. The relevance of D&O coverage with respect to cyber issues increased significantly in 2014 and 2015 as shareholder derivative actions were filed against officers and directors of Target103 and Wyndham104 as a result of widely reported cyber breaches involving those companies. These lawsuits challenge the level of supervision by board members 101. 102. 103. 104. See, e.g., PLM, Inc. v. Nat’l Union Fire Ins. Co., 1986 U.S. Dist. LEXIS 17014, at *6–7 (N.D. Cal. Dec. 2, 1986) (policy provided coverage to individual directors and officers for loss incurred in their capacity as directors and officers), aff ’d, 848 F.2d 1243 (9th Cir. 1988); Sphinx Int’l, Inc. v. Nat’l Union Fire Ins. Co., 412 F.3d 1224, 1227–28 (11th Cir. 2005) (policy providing coverage for duly elected directors and officers for loss incurred in their capacity as directors and officers). See generally 4 DAN A. BAILEY ET AL., NEW APPLEMAN ON INSURANCE § 26.01 (2015). See, e.g., D&O Insuring Agreements, IRMI.com, www.irmi.com/online/ pli/ch010/1l10e000/al10e010.aspx#jd_entity_securities_coverage_side_c (last visited June 23, 2014) (“the vast majority of D&O policies that provide entity coverage do so only as respects securities claims”). See In re Target Corp. Customer Data Sec. Breach Litig., 309 F.R.D. 482, 490 (D. Minn. 2015) (granting motion for class certification). See Complaint, Palkon v. Holmes, No. 2:14-cv-01234 (D.N.J. Feb. 25, 2014); see also Palkon v. Holmes, 2014 WL 5341880 (D.N.J. Oct. 20, 2014) (finding that board’s decision not to bring suit against the company for inadequate data security was not in violation of the business judgment rule, reasoning that the board took adequate steps to familiarize itself with the subject matter of the demand and that it had ample information at its disposal). 16–24 © Practising Law Institute Insurance Coverage for Data Breaches § 16:2.3 and claim that they “failed to take reasonable steps to maintain their customers’ personal and financial information in a secure manner.”105 These kinds of claims and increasing public attention to these issues106 underscore the importance of D&O coverage and careful board vigilance in relation to data retention, cybersecurity, and relevant insurance coverage. They also emphasize the importance of avoiding overbroad cyber exclusions in D&O policies so that normal D&O exposures are not excluded simply because they may relate to cybercrimes.107 [B] Errors and Omission Policies E&O policies provide coverage for claims arising out of the rendering of professional services.108 Such policies may provide coverage for data breaches or privacy-related claims that arise from the “rendering of services” so long as policy definitions and exclusions do not exclude losses relating to such breaches or Internet-related services. 109 E&O 105. 106. 107. 108. 109. See Complaint, Palkon v. Holmes, No. 14-cv-01234 (D.N.J. Feb. 25, 2014); see also In re Heartland Payment Sys., Inc. Sec. Litig., 2009 WL 4798148, at *2, *8 (D.N.J. Dec. 7, 2009) (dismissing suit where plaintiffs alleged that the defendants falsely represented that the company “place[d] significant emphasis on maintaining a high level of security” and maintained a network that “provide[d] multiple layers of security to isolate [its] databases from unauthorized access”). Danny Yadron, Corporate Boards Race to Shore up Cybersecurity, WALL ST. J., June 29, 2014, http://online.wsj.com/articles/boards-race-to-bolstercybersecurity-1404086146. In a June 10, 2014, speech, SEC Commissioner Luis Aguilar emphasized that “ensuring the adequacy of a company’s cybersecurity measures needs to be a part of a board of director ’s risk oversight responsibilities.” Luis A. Aguilar, Comm’r, U.S. Sec. & Exch. Comm’n, Speech at the Cyber Risks and the Boardroom Conference: Boards of Directors, Corporate Governance and Cyber-Risks: Sharpening the Focus (June 10, 2014). See also infra note 214. See, e.g., Pac. Ins. Co. v. Burnet Title, Inc., 380 F.3d 1061, 1062 (8th Cir. 2004) (“Pacific issued an Errors and Omissions (E&O) insurance policy . . . which provided coverage for negligent acts, errors, or omissions in the rendering of or failure to render professional services.”); Matthew T. Szura & Co. v. Gen. Ins. Co. of Am., 543 F. App’x 538, 540–41, 543 (6th Cir. 2013) (holding that the E&O policy at issue covered “wrongful acts arising out of the performance of professional services for others,” but not “intentionally wrongful conduct”). See generally 4 PAUL S. WHITE & RICHARD L. NEUMEIER, APPLEMAN ON INSURANCE § 25.01 (2012). See, e.g., Eyeblaster, Inc. v. Fed. Ins. Co., 613 F.3d 797 (8th Cir. 2010) (in addition to finding coverage for property damage under a CGL policy, the court found that coverage existed under an E&O policy, stating that the definition of “error” in a technology errors and omissions policy included intentional, non-negligent acts but excludes intentionally wrongful conduct). But see Travelers Prop. Cas. Co. of Am. v. Fed. Recovery Servs., Inc., (Proskauer, 2d ed., 11/16) 16–25 © Practising Law Institute § 16:2.3 PROSKAUER ON PRIVACY policies designed for medical professionals or health plan fiduciaries often include specific coverages for HIPAA and other privacy exposures, including computer privacy breaches.110 Attorney and other malpractice policies may also cover certain risks associated with unintentional release of confidential information or client funds. For example, in Stark & Knoll Co. L.P.A. v. ProAssurance Casualty Co.,111 the court held that the insured law firm may be covered under its malpractice policy when one of its attorneys fell victim to an alleged phishing scam and sent nearly $200,000 of client funds to an offshore account.112 Law firms have become repeated targets of cyber attacks seeking confidential client information about transactional and other matters.113 These kinds of matters may give rise to asserted claims for improper protection of client information.114 110. 111. 112. 113. 114. 2015 WL 2201797 (D. Utah May 11, 2015) (holding there was no duty to defend under the insured’s CyberFirst Policy since the policy covered an “error, omission or negligent act” and the underlying lawsuit alleged that the insured intentionally refused to return the plaintiff ’s customer data); Margulis v. BCS Ins. Co., 23 N.E.3d 472 (Ill. App. Ct. 1st Dist. 2014) (holding that automated telephone calls advertising insured’s business did not constitute negligent acts, errors or omissions by insured in “rendering services for others” since the insured was not rendering services for the call recipients). See, e.g., Med. Records Assocs., Inc. v. Am. Empire Surplus Lines Ins. Co., 142 F.3d 512, 516 (1st Cir. 1998) (in coverage dispute case, court noted that hospital employees involved in safeguarding personal medical information may have coverage under an E&O policy given the substantial “risks associated with release of records to unauthorized individuals”); Princeton Ins. Co. v. Lahoda, D.C., 1996 WL 11353 (E.D. Pa. Jan. 4, 1996) (finding an improper disclosure of confidential patient information was covered by a professional liability insurance policy). Stark & Knoll Co. L.P.A. v. ProAssurance Cas. Co., 2013 U.S. Dist. LEXIS 50326 (N.D. Ohio Apr. 8, 2013). Id. at *3, *9–23; see also Nardella Chong, P.A. v. Medmarc Cas. Ins. Co., 642 F.3d 941 (11th Cir. 2011) (losses due to Nigerian check scam arose from provision of professional services and were covered by attorney’s professional liability insurance policy); note 117, infra. But see Attorneys Liab. Prot. Soc’y, Inc. v. Whittington Law Assocs., PLLC, 961 F. Supp. 2d 367, 375 (D.N.H. 2013) (holding that “the plain and unambiguous language” of policy exclusion “for any claim arising from or in connection with any conversion, misappropriation or improper commingling” excludes coverage for misappropriation of funds). Jason Bloomberg, Cybersecurity Lessons Learned From “Panama Papers” Breach, FORBES (Apr. 21, 2016), www.forbes.com/sites/jasonbloomberg/ 2016/04/21/cybersecurity-lessons-learned-from-panama-papers-breach/ #4042b98b4f7a. Gabe Friedman, Threats of Litigation After Data Breaches at Major Law Firms, BLOOMBERG LAW (Mar. 30, 2016). 16–26 © Practising Law Institute Insurance Coverage for Data Breaches § 16:2.3 [C] Crime Policies Crime policies generally provide first-party coverage and insure a policyholder ’s property against theft.115 In some cases, crime policies also provide third-party coverage against an insured’s liability for theft, forgery, or certain other crimes injuring a third party.116 Insureds are increasingly turning to this coverage in cases involving theft resulting from the inadvertent transferring of funds caused by a fraudulent email.117 While the courts have recognized that the concept of a crime policy seems on its face to encompass theft of confidential information, many crime policies specifically exclude theft of cyber or intellectual property. 118 Even when this is not the case, these 115. 116. 117. 118. See, e.g., Medidata Sols., Inc. v. Fed. Ins. Co., No. 1:15-cv-00907 (S.D.N.Y. Mar. 10, 2016) (rejecting cross-motions for summary judgment on computer fraud policy in coverage action for phishing scam perpetrated against medical data services provider); Universal Am. Corp. v. Nat’l Union Fire Ins. Co. of Pittsburgh, Pa., 37 N.E.3d 78 (N.Y. 2015) (denying coverage under policy’s computer fraud section for Medicare fraud scheme perpetrated by employees, reasoning that use of computer to make false entries about medical treatments that were never provided was merely incidental to fraud scheme). See, e.g., Retail Ventures, Inc. v. Nat’l Union Fire Ins. Co., 691 F.3d 821 (6th Cir. 2012) (affirming the district court’s grant of summary judgment for the insured and upholding ruling under Ohio law that a commercial crime policy, which included a computer and funds transfer fraud endorsement, covered third-party costs resulting from data breach and hacking attack). See, e.g., Apache Corp. v. Great Am. Ins. Co., 2015 WL 7709584 (S.D. Tex. Aug. 7, 2015) (appeal pending) (finding coverage under insured’s crime protection policy covering “computer fraud” for insured’s inadvertent wire transfer of $1.4 million caused by a fraudulent email, reasoning that insured’s loss resulted “directly from [computer fraud]”); State Bank v. BancInsure, Inc., 823 F.3d 456 (8th Cir. 2016) (finding coverage under insured’s financial institution bond for fraudulent transfer caused by computer virus, reasoning that “the computer systems fraud was the efficient and proximate cause of [the] loss,” regardless if other non-covered causes contributed); Ameriforge Grp., Inc. v. Fed. Ins. Co., No. 201600197 (Tex. Dist. Ct. Harris Cty. Jan. 4, 2016) (alleging that defendant breached its contract by denying coverage for inadvertent wire transfer prompted by fraudulent email). See, e.g., Cargill, Inc. v. Nat’l Union Fire Ins. Co., 2004 Minn. App. LEXIS 33, at *18 (Ct. App. Jan. 13, 2004) (crime policy specifically excluded “loss resulting directly or indirectly from the accessing of any confidential information, including, but not limited to, trade secret information, computer programs, confidential processing methods or other confidential information of any kind”); Ins. Servs. Office, Inc., Commercial Crime Coverage Form CR 00 20 05 06 § (F)(15) (2008), available at LEXIS, ISO Policy Forms (explicitly excludes computer programs and electronic data from the definition of “property”). But see Retail Ventures, 691 F.3d (Proskauer, 2d ed., 11/16) 16–27 © Practising Law Institute § 16:3 PROSKAUER ON PRIVACY policies often limit coverage to theft of physical things or cash or securities.119 § 16:3 Modern Cyber Policies While some specialized coverages, such as errors and omissions (E&O) insurance in the medical or fiduciary context, specifically include cyber and privacy risks inherent in the activity on which coverage is focused, as discussed above, traditional policy forms often impose significant limitations on coverage for these kinds of risks. 120 Indeed, it is likely that gaps in coverage for cyber and privacy risks will continue to widen as insurers increase the number of exclusions designed to limit coverage in traditional policies for these kinds of claims and try to confine coverage for cyber and privacy to policies specifically designed for this purpose.121 In response to the coverage gaps created by evolving exclusions and policy definitions, the market for cyber insurance policies has responded with a host of new policies.122 The new policy offerings are typically named peril policies and offer coverage on a claims-made basis. However, because of the ever-evolving nature of the risks presented and the lack of standard policy terms, these offerings are in an ongoing state of flux as insurers continue to change and refine their policy forms. As a result, risk managers looking to purchase cyber insurance products have latitude to negotiate and should carefully evaluate the needs and risks for which coverage is sought against a 119. 120. 121. 122. 821 (finding coverage under computer fraud rider to blanket crime policy for losses from hacker ’s theft of customer credit card and checking account data). See, e.g., Ins. Servs. Office, Inc., Commercial Crime Coverage Form CR 00 20 05 06 § (A)3–8; § (F)(15) (2008) (coverage is for loss of money or securities, fraud, and theft of “other property,” which is defined as “any tangible property other than ‘money’ and ‘securities’ that has intrinsic value” but excluding computer programs and electronic data). See section 16:2, supra. See notes 16, 29, 32, 47, 73, 85, and 119, supra. See, e.g., Travelers Knows Cyber Insurance, TRAVELERS, www.travelers. com/business-insurance/cyber-security/index.aspx (last visited Aug. 17, 2016); CyberEdge, AIG, www.aig.com/CyberEdge_3171_417963.html; CHUBB CyberSecurity Form 14-02-14874, § I.J. (2009); Philadelphia Insurance Co. Cyber Security Liability Coverage Form PI-CYB-001, § I.C. (2010); see also RICHARD S. BETTERLY, THE BETTERLEY REPORT: CYBER/ PRIVACY INSURANCE MARKET SURVEY 2015 (June 2015) (surveying over thirty carriers that offer cyber insurance products), http://betterley.com/ samples/cpims15_nt.pdf. 16–28 © Practising Law Institute Insurance Coverage for Data Breaches § 16:3.1 detailed evaluation of the coverage actually provided by the new policy.123 § 16:3.1 Key Concepts in Cyber Coverage As noted above, two important features of cyber policies are that they are often named peril policies and written on a claims-made basis. [A] Named Peril Although the derision of all-risk and named-peril policies is based on conceptual frameworks that developed largely in the first-party context and many policies are hybrids that do not fall neatly in one category or the other, insurance policies are often categorized as either all-risk or named-peril policies. All-risk policies typically cover all risks in a particular category unless they are expressly excluded. For example, the classic all-risk property policy covers “all risk of direct physical loss or damage” to covered property unless excluded.124 These policies are said to offer broad and comprehensive coverage.125 Named-peril policies, on the other hand, cover only specified “perils” or risks. In the traditional property context, this may have been wind, storm, and fire, with some policies covering floods while others do not. Unlike all-risk policies, named-peril policies do not typically provide coverage for risks other than the named perils. 126 123. 124. 125. 126. A recent white paper published by Wells Fargo noted that survey respondents’ biggest challenge to purchasing cyber coverage was finding a policy that fit the company’s needs (47% of respondents). Dena Cusick, 2015 Cyber Security and Data Privacy Survey: How Prepared Are You?, at 3 (Wells Fargo, White Paper Sept. 2015). See, e.g., City of Burlington v. Indem. Ins. Co. of N. Am., 332 F.3d 38, 47 (2d Cir. 2003) (“All-risk policies . . . cover all risks except those that are specifically excluded.”). See, e.g., Villa Los Alamos Homeowners Ass’n v. State Farm Gen. Ins. Co., 130 Cal. Rptr. 3d 374, 382 (Ct. App. 2011) (“Coverage language in an all risk . . . policy is quite broad, generally insuring against all losses not expressly excluded.”). See generally 7 COUCH ON INSURANCE § 101:7 (3d ed. 2011). See, e.g., Burrell Commc’ns Grp. v. Safeco Ins., 1995 U.S. Dist. LEXIS 11699, at *3 (N.D. Ill. Aug. 10, 1995) (the insurance policy at issue in the case was “an enumerated perils policy, meaning that only certain named perils are covered”). See generally 4 JEFFREY E. THOMAS, NEW APPLEMAN ON INSURANCE LAW LIBRARY EDITION § 29.01(3)(b)(1) (2015) (“‘named peril’ policies . . . cover only the damages that result from specific categories of risks, and ‘all risks’ policies . . . cover the damages from all risks except those specifically excluded by the policy”). (Proskauer, 2d ed., 11/16) 16–29 © Practising Law Institute § 16:3.1 PROSKAUER ON PRIVACY Cyber policies are generally named-peril policies, at least in the first-party property context, and different carriers have used dramatically different policy structures and definitions to describe what they cover and what they do not. Some of the more typical areas of coverage include: First-party coverages • costs of responding to a data breach, including privacy notification expenses and forensics • loss of electronic data, software, hardware, and costs of reconstructing data • loss of use and business interruption • data security and privacy injury • loss from cyber crime • rewards for responding to cyber threats and extortion paid • business interruptions due to improper access to computer systems • public relation for cyber risks Third-party coverages • suits against insured for data breach or defamation • loss of another ’s electronic data, software or hardware, resulting in loss of use • loss of funds of another due to improper transfer • data security and privacy injury • statutory liability under state and federal privacy laws • advertising injury • intellectual property infringement Governmental action may fall in both first- and third-party covers depending on particular policy wording. [B] Claims Made Most cyber policies are claims-made policies, which in very general terms means that the policy is triggered by a claim made and, in some cases, noticed during the policy period.127 Most claims-made policies 127. See generally 2 RONALD N. WEIKERS, DATA SEC. AND PRIVACY LAW § 14:36 (2015). 16–30 © Practising Law Institute Insurance Coverage for Data Breaches § 16:3.1 contain provisions, commonly known as “tail” provisions, which provide an extended reporting period during which an insured can give notice of a claim made after the end of the policy period that alleges a wrongful act before the policy period ended. 128 But even here, there is often a specific time span in which notice must be given to the insurer.129 Claims-made policies are distinguished from occurrence policies, which are typically triggered by an event or damage during the policy period, regardless of when the occurrence is known to the insured or notified to the insurer.130 In some cases, such as mass torts, environmental contamination or asbestos, occurrence policies in effect at the time of the contamination or exposure to an allegedly dangerous product or substance can cover claims asserted decades later after the contamination is discovered or the policyholder is sued by a claimant who alleges recent diagnosis of illness.131 Because cyber policies usually are written on a claims-made basis, they generally cover claims made, and in some cases noticed, during the policy period. This allows the insurer to attempt to limit exposure to the policy period (and any tail period) without having to wait many years to see if a breach is later discovered to have occurred during the period the policy was in effect. In addition to having dates by which notice must be given, many claims-made policies have “retro” dates that preclude claims for breaches prior to a designated date, regardless of when the claim is asserted and noticed to the insurer.132 Often, these retro dates are 128. 129. 130. 131. 132. See generally 3 JEFFREY E. THOMAS, NEW APPLEMAN ON INSURANCE LAW LIBRARY EDITION § 16.07 (2012). See, e.g., Prodigy Commc’ns Corp. v. Agric. Excess & Surplus Ins. Co., 288 S.W.3d 374, 375 (Tex. 2009) (claims-made policy ’s tail provision required insured to give notice of a claim “as soon as practicable . . . , but in no event later than ninety (90) days after the expiration of the Policy Period” which the court found binding). See generally 3 ALLAN D. WINDT, INSURANCE CLAIMS AND DISPUTES § 11.5 (6th ed. 2013). See, e.g., Scott’s Liquid Gold, Inc. v. Lexington Ins. Co., 293 F.3d 1180, 1182–83 (10th Cir. 2002) (upholding a decision finding insurer has a duty to indemnify insured for occurrence of pollution into soil and groundwater in the 1970s, even though the action was brought in 1994); Keene Corp. v. Ins. Co. of N. Am., 667 F.2d 1034, 1040 (D.C. Cir. 1981) (finding insurer liable for injuries, as defined by the policy, that caused asbestos-related harm many years after inhalation in an occurrence policy). See generally 4 JEFFREY E. THOMAS, NEW APPLEMAN ON INSURANCE LAW LIBRARY EDITION § 27.01 (2015). See, e.g., Coregis Ins. Co. v. Blancato, 75 F. Supp. 2d 319, 320–21 (S.D.N.Y. 1999) (“‘Retroactive Date’ is defined in the policy as: the date, if specified in the Declarations or in any endorsement attached hereto, on or after which (Proskauer, 2d ed., 11/16) 16–31 © Practising Law Institute § 16:3.2 PROSKAUER ON PRIVACY designed to limit coverage to the first time a particular carrier began issuing claims-made policies to a particular insured. Many policies also include provisions aggregating claims from a single breach or related series of breaches into one insurance contract or period in effect when the first claim is asserted.133 In addition, it may be possible under some policy provisions to provide a notice of circumstance, which will bring claims asserted after the policy expires into the policy period when the notice of circumstances was asserted.134 Such notices are often at the discretion of the insured, but insurers sometimes raise issues as to the level of particularity required for such notices to be effective. § 16:3.2 Issues of Concern in Evaluating Cyber Risk Policies Though they vary in structure and form, the new cyber risk policies raise a variety of issues, some of which are akin to issues posed by more traditional insurance policies and some of which are unique to these new forms. [A] What Is Covered? As noted above, cyber policies are, at least in some respects, namedperil policies.135 In other words, they generally cover specifically identified risks. In order to determine the utility of the coverage being provided, a policyholder needs to assess carefully its own risks and then compare them to the protections provided by a particular form. For example, a company in the business of providing cloud computing 133. 134. 135. any act, error, omission or PERSONAL INJURY must have occurred in order for CLAIMS arising therefrom to be covered under this policy. CLAIMS arising from any act, error, omission or PERSONAL INJURY occurring prior to this date are not covered by this policy.”); City of Shawnee v. Argonaut Ins. Co., 546 F. Supp. 2d 1163, 1181 (D. Kan. 2008) (policy contains “a Retroactive Date-Claims Made Coverage endorsement”). See generally 3 JEFFREY E. THOMAS, NEW APPLEMAN INSURANCE LAW PRACTICE GUIDE § 16.07 (2015). See, e.g., WFS Fin. Inc. v. Progressive Cas. Ins. Co., 2005 U.S. Dist. LEXIS 46751, at *6 (C.D. Cal. Mar. 29, 2005) (policy stated: “Claims based upon or arising out of the same Wrongful Act or Interrelated Wrongful Acts committed by one or more of the Insured Persons shall be considered a single Claim, and only one Retention and Limit of Liability shall be applicable . . . each such single claim shall be deemed to be first made on the date the earliest of such Claims was first made, regardless of whether such date is before or during the Policy Period.”), aff ’d, 232 F. App’x 624 (9th Cir. 2007). See generally 3 JEFFREY E. THOMAS, NEW APPLEMAN ON INSURANCE LAW LIBRARY EDITION § 20.01 (2015). See section 16:3.1[A], supra. 16–32 © Practising Law Institute Insurance Coverage for Data Breaches § 16:3.2 services to third parties gains limited protection from a policy form that specifically excludes, or does not cover in the first place, liabilities to third parties due to business interruption.136 On the other hand, a company that is highly reliant on cloud providers is left with substantial uninsured risk when its cyber policy does not include loss of information or disruption of its cloud provider. In another illustration of the issue, the array of problems and issues of policyholders that sell computer services are different from those of companies that sell no services to others but handle a great deal of statutorily protected medical or personal financial information. The first step in analyzing the cyber policy is to compare the risks of the policyholder at issue to the specific coverages provided. [B] Confidential Information, Privacy Breach, and Other Key Definitions Under most cyber policies, there are key definitions such as confidential information, personal identifiable information, computer or computer system, and privacy or security breach that are crucial to analyzing and understanding coverage. In some cases, policy language ties these definitions to statutory schemes in the United States and abroad that themselves are constantly changing. 137 However they are drafted, these key definitions and their applicability can be very technical and need to be reviewed by both insurance and technology experts to ensure that the risks inherent in a particular technology platform are adequately covered. This is particularly true as more and more businesses rely on third-party providers or affiliated entities within a corporate family for technology services. For example, some policies may cover leased computers or information in the hands of vendors while other policies may not. Coverage for data in the hands of a third party may require memorialization of the relationship in a written contract. Careful vetting of these key definitions is essential to understanding and negotiating coverage. 136. 137. In an example of insurance products evolving to meet specific needs, the International Association of Cloud & Managed Service Providers (MSPAlliance) recently announced that it had partnered with Lockton Affinity to offer a new Cloud and Managed Services Insurance Program, which offers “comprehensive protection for cloud and managed service providers (MSPs).” See Celia Weaver, MSPAlliance® Launches Cloud Computing Insurance Program, MSPALLIANCE (Apr. 25, 2013), http:// mspalliance.com/mspalliance-launches-cloud-insurance-program/. In 2015, thirty-three states introduced or considered revisions to their existing security breach laws. 2015 Security Breach Legislation, NAT ’L CONFERENCE OF STATE LEGISLATURES (Dec. 31, 2015), www.ncsl.org/ research/telecommunications-and-information-technology/2015-securitybreach-legislation.aspx. (Proskauer, 2d ed., 11/16) 16–33 © Practising Law Institute § 16:3.2 PROSKAUER [C] ON PRIVACY Overlap with Existing Coverage One of the difficult issues with the new cyber policies is determining what coverage they provide in comparison to the insurance provided by traditional policies. Most risk managers do not want to pay for the same coverage twice, much less to have two carriers arguing with each other as to which is responsible, or about how to allocate responsibility between them for a particular loss. Many brokers prepare analyses for their clients of the interplay between traditional coverages and cyber policies, and these comparisons should be considered carefully to avoid multiple and overlapping coverages for the same risks. Examples of potential overlaps may include: physical destruction to computer equipment covered by property and cyber policies; disclosure of confidential personal information potentially covered by CGL, E&O, and cyber policies; and theft of computer resources or information under crime and cyber policies. The extent of any overlap among these or other coverage may only be identified by careful analysis. [D] Limits and Deductibles Because cyber policies are typically structured as named peril policies, they often have specific limits or sublimits as well as deductibles for each type of coverage. Many cyber policies are crafted for “low frequency but high severity” cyber-attacks affecting large amounts of electronic data.138 However, some companies now face a growing number of repeated smaller-scale data breaches and need to consider deductible structures that will permit coverage for these costs.139 In any event, primary and excess limits associated with a particular coverage must be reviewed to ensure adequate coverage for risks of key concern. One issue that often arises in traditional policies, and may also arise in the cyber context, is whether an insured’s losses are subject to multiple sublimits or multiple deductibles. For example, an insured’s policy may contain multiple “sublimits,” or “per claim” or “per occurrence” deductibles140 that apply to losses in various categories.141 138. 139. 140. 141. See ADVISEN, MITIGATING THE INEVITABLE: HOW ORGANIZATIONS MANAGE DATA BREACH EXPOSURES (Mar. 2016), www.advisenltd.com/wp-content/ uploads/2016/03/how-organizations-manage-data-breach-exposures-201603-03.pdf. See id. See, e.g., W. Heritage Ins. Co. v. Asphalt Wizards, 795 F.3d 832 (8th Cir. 2015) (deductible amount not met for TCPA violations due to $1000 per claim deductible); First Mercury Ins. Co. v. Nationswide Sec. Servs., 54 N.E.3d 323 (Ill. App. Ct. 2016) (applying a “per claim” deductible of $500 relating to TCPA damages). See, e.g., CNA Commercial Property Policy Form G-145707-C (2012). 16–34 © Practising Law Institute Insurance Coverage for Data Breaches § 16:3.2 Depending on the policy form, there may be arguments as to whether the insured is entitled to collect under multiple sublimits or whether the entirety of the insured’s losses are capped by one of the sublimits in question.142 Similar issues may arise when the policy contains multiple potentially applicable deductibles.143 When negotiating a cyber policy, it is important that the policy make clear how multiple sublimits and deductibles will apply in such situations. Where a policy has sublimits, it is also important to review excess policies to be sure they attach in excess of the sublimits as well as applicable aggregates. [E] Notice Requirements As noted above, cyber policies are often claims-made policies. 144 But unlike many claims-made policies, particularly in the liability context, cyber polices sometimes require notice to insurers of known occurrences and lawsuits “as soon as practicable” or even “immediately.” These clauses are particularly common where insurers are obligated to defend a claim, their theory being that they want to know of the claim as early as possible in order to defend. Putting aside issues of how soon is practicable or immediate, 145 a question that commonly arises in situations where notice is required 142. 143. 144. 145. See, e.g., Hewlett-Packard Co. v. Factory Mut. Ins. Co., 2007 WL 983990 (S.D.N.Y. 2007) (holding that the insured was entitled to collect for property damage up to $50 million under its “electronic data processing” sublimit, as well as its additional losses for business interruption, which were not capped by the electronic data processing sublimit); see also Penford Corp. v. Nat’l Union Fire Ins. Co. of Pittsburg, 2010 WL 300838 (N.D. Iowa Jan. 19, 2010) (where the sublimits themselves did not indicate the scope of coverage, court looked to other provisions and allowed extrinsic evidence for clarification). See, e.g., Gen. Star Indem. v. W. Fla. Vill. Inn, 874 So. 2d 26 (Fla. Dist. Ct. App. 2004) (involving the issue of which deductible applied on a policy containing two different deductibles for different types of causes of loss). See section 16:3.1[B], supra. See 8f-198 APPLEMAN ON INSURANCE § 4734 (2013) (what is immediate or practicable depends upon the facts of a particular case and does do not require instantaneous notice); see also ALLAN D. WINDT, INSURANCE CLAIMS AND DISPUTES § 1:1 (2010) (the soon-as-practicable standard generally involves a consideration of what is reasonable given the circumstances). Many jurisdictions require the insurer to show prejudice to support a late notice defense. See, e.g., Ins. Co. of Pa. v. Associated Int’l Ins. Co., 922 F.2d 516, 526 (9th Cir. 1990) (“Under California law, the insurer has the burden of proving actual and substantial prejudice.”); Nat’l Sur. Corp. v. Immunex Corp., 297 P.3d 688, 696 (Wash. 2013) (same). However, policies requiring notice within the policy period or an extended reporting period are often enforced. See, e.g., James & Hackworth v. Cont’l Cas. Co., 522 F. Supp. 785 (N.D. Ala. 1980) (enforcing provision that required insured to provide notice during the policy period or within sixty days after its expiration). (Proskauer, 2d ed., 11/16) 16–35 © Practising Law Institute § 16:3.2 PROSKAUER ON PRIVACY is when the obligation to give notice is triggered. For many years, practitioners have advised large corporate insureds to limit the obligation to give notice to situations where a specified individual or group of individuals—commonly the risk manager, CFO, or general counsel— has knowledge of the claim. This is especially important in far-flung organizations where an individual who receives knowledge of a claim or potential claim may not be in a position to give notice or even understand that notice is required. Where policies contain these kinds of provisions, courts have repeatedly held them to be enforceable. 146 The issue of whose knowledge triggers the obligation to give notice takes on particular significance in the context of cyber risks. There may sometimes be a considerable lapse between the time of a covered event and the time when knowledge of that event surfaces. In some cases, knowledge of the event may be confined to front-line information technology personnel who are focused on containing the problem and have no familiarity with insurance or its requirements. As a result, it is important to attempt to negotiate provisions in cyber policies that predicate the requirement to give notice on knowledge by the risk manager, CFO or CIO, or similarly appropriate individuals. It may also be important to develop internal procedures to ensure that insurable claims are brought to the attention of such individuals. [F] Coverage for Regulatory Investigations or Actions A major issue in evaluating cyber coverages is the extent to which there is coverage for regulatory investigations or actions. As an example, the Federal Trade Commission (FTC) regularly launches investigations, both formal and informal, into company practices that may violate section 5 of the Federal Trade Commission Act (“FTC Act”) by unfairly handling consumer information. 147 Other 146. 147. See, e.g., Hudson Ins. Co. v. Oppenheim, 81 A.D.3d 427, 428 (N.Y. App. Div. 2011) (upholding a provision stating: “The subject policy required the insured to provide notice of a loss ‘At the earliest practicable moment after discovery of loss by the Corporate Risk Manager,’ and provided that ‘Discovery occurs when the Corporate Risk Manager first becomes aware of facts.’”); QBE Ins. Corp. v. D. Gangi Contracting Corp., 888 N.Y.S.2d 474, 475 (App. Div. 2009) (enforcing an insurance policy stating: “Knowledge . . . by Your agent, servant or employee shall not in itself constitute knowledge of you unless the Corporate Risk Manager of Your corporation shall have received notice of such Occurrence.”). The FTC’s power was recently affirmed in FTC v. Wyndham Worldwide Corp., 799 F.3d 236 (3d Cir. 2015), where the federal court rejected a challenge to the FTC’s authority to use its section 5 authority to sue merchants for data breaches. After Wyndham suffered several data breaches between 2008 and 2010, the FTC filed an action alleging that Wyndham engaged in unfair practices and that its privacy policy was 16–36 © Practising Law Institute Insurance Coverage for Data Breaches § 16:3.2 regulatory bodies have entered the fray as well. For instance, one Securities & Exchange Commission (SEC) commissioner has stated that even though a company’s management team may have primary responsibility for overseeing cyber risk management, the board of directors is responsible for overseeing the implementation and appropriateness of these programs.148 Cybersecurity cases have become a principal enforcement focus for the SEC, specifically relating to internal controls to protect market integrity and disclosure of material cyber events.149 Likewise, the Financial Industry Regulatory authority (FINRA) has stated that cybersecurity is an enforcement priority.150 State attorneys general also exercise investigative and prosecutorial powers in the cyber area, as do regulatory and law enforcement authorities around the globe.151 In many instances, coverage for these kinds of situations will turn on the definition of “claim” in the relevant policy.152 If, for example, a claim is defined as an action for civil damages, regulatory actions may not fall within that category.153 Most policies address this issue by including a much broader definition of “claim” that encompasses criminal proceedings, claims for injunctive relief, and certain administrative or regulatory proceedings as well.154 148. 149. 150. 151. 152. 153. 154. deceptive. Id. at 240; see also Complaint, In re Snapchat, Inc., No. 132 3078 (FTC Dec. 23, 2014) (alleging that Snapchat violated section 5 of the FTC Act by, among other things, falsely representing that its users’ messages would permanently disappear and by collecting users’ location information); Complaint, In re LabMD, Inc., No. 102 3099 (FTC Aug. 28, 2013) (alleging that LabMD violated section 5 of the FTC Act by failing to “provide reasonable and appropriate security for personal information on its computer networks”). Comm’r Luis A. Aguilar, Address at Cyber Risks and the Boardroom Conference: Boards of Directors, Corporate Governance and Cyber-Risks: Sharpening Focus (June 10, 2014). Id. See FINRA, Report on Cybersecurity Practices, Feb. 2015, www.finra.org/ sites/default/files/p602363%20Report%20on%20Cybersecurity%20 Practices_0.pdf. See, e.g., Press Release, European Union Agency for Network & Info. Sec., New Regulation for EU Cybersecurity Agency ENISA, with New Duties (June 18, 2013), www.enisa.europa.eu/news/enisa-news/new-regulationfor-eu-cybersecurity-agency-enisa-with-new-duties. See also infra note 214 (discussing exclusion for failure to consistently implement cyber risk controls). See, e.g., Passaic Valley Sewerage Comm’rs v. St. Paul Fire & Marine Ins. Co., 21 A.3d 1151, 1159 (N.J. 2011) (rejecting an insured’s coverage for a claim for injunctive regulatory relief because, under the policy, a claim was defined as one for civil damages). See, e.g., CHUBB Forefront for Insurance Companies Form 17-02-17 (1999) (“Claim means: (i) a written demand for monetary damages or non-monetary relief; (ii) a civil proceeding commenced by the service of a (Proskauer, 2d ed., 11/16) 16–37 © Practising Law Institute § 16:3.2 PROSKAUER ON PRIVACY As illustrated by various cases involving D&O liability policies, the definition of claim can be very important in establishing the degree of formality required for coverage to be available for a particular regulatory initiative. Some policies, for example, require the filing of a notice of charges, an investigative order, or similar document. Under such policies, insurers may attempt to require a proceeding initiated by formal administrative action as a precondition to coverage. This can be problematic since many administrative initiatives are informal and, in many cases, policyholders would prefer that they remain at an informal stage. The issue is illustrated by cases like Office Depot, Inc. v. National Union Fire Insurance Co. of Pittsburgh, Pa.155 and MBIA, Inc. v. Fed. Ins. Co.156 In the Office Depot case, the policyholder sought coverage for an SEC investigation into assertions it had selectively disclosed certain non-public information in violation of federal securities laws.157 While the SEC’s investigation of Office Depot had commenced in 2007, no subpoena was issued until 2008.158 The policy contained coverage for a “securities claim,” but the definition of “securities claim” specifically carved out “an administrative or regulatory proceeding against, or investigation of the [company]” unless “during the time such proceeding is also commenced and continuously maintained against an Insured Person.”159 Recognizing that the policy 155. 156. 157. 158. 159. complaint or similar pleading; (iii) a criminal proceeding commenced by the return of an indictment; or (iv) a formal administrative or regulatory proceeding.”); Liberty Mutual Group: Liberty Insurance Underwriters, Inc. General D&O Form US/D&O2000-POL (Ed. 1/00) (2004) (“The definition of claim includes a written demand for monetary or nonmonetary relief, a civil or criminal proceeding or arbitration, a formal administrative or regulatory proceeding, or a formal criminal, administrative investigation commenced.”). Office Depot, Inc. v. Nat’l Union Fire Ins. Co., 453 F. App’x 871 (11th Cir. 2011). MBIA, Inc. v. Fed. Ins. Co., 652 F.3d 152 (2d Cir. 2011). Office Depot, 453 F. App’x at 871. Id. at 874. As the court explained: Two policy provision[s] are relevant to the disposition of this issue. First, the insuring agreement language provides: COVERAGE B: ORGANIZATION INSURANCE (i) Organization Liability. This policy shall pay the Loss of any Organization arising from a Securities Claim made against such Organization for any Wrongful Act of such Organization. . . . The policy defines a Securities Claim as: a Claim, other than an administrative or regulatory proceeding against, or investigation of an Organization, made against any Insured: 16–38 © Practising Law Institute Insurance Coverage for Data Breaches § 16:3.2 provided coverage for regulatory or administrative proceedings under certain circumstances, the Eleventh Circuit held that the policy did not provide coverage for administrative or regulatory “investigations.”160 The Office Depot court held that informal requests by the SEC were part of an investigation that did not become a proceeding and subject to coverage until the issuance of a subpoena.161 A different approach is illustrated by the MBIA case. There, the policyholder, MBIA, sought coverage for an SEC investigation into its reporting of three financial transactions.162 While the SEC obtained a formal investigatory order, it did not issue subpoenas to MBIA because MBIA had asked the SEC to “accept voluntary compliance with their demands for records in lieu of subpoenas to avoid adverse publicity for MBIA.”163 The policy provided coverage for any “formal or informal administrative or regulatory proceeding or inquiry commenced by the filing of a notice of charges, formal or informal investigative order or similar document.”164 The insurers argued that because the SEC’s investigation of MBIA had proceeded through oral requests, as opposed to subpoenas or other formal processes, the SEC investigation was not covered under the policy.165 The Second Circuit held that the oral requests were issued pursuant to a formal investigative order and thus constituted securities claims under the policy.166 The Second Circuit went on to state that “insurers cannot require that as an investigation proceeds, a company must suffer extra public relations damage to avail itself of coverage a reasonable person would think was triggered by the initial investigation.”167 (1) alleging a violation of any federal, state, local or foreign regulation, rule or statute regulating securities . . . ; or (2) brought derivatively on the behalf of an Organization by a security holder of such Organization. Notwithstanding the foregoing, the term “Securities Claim” shall include an administrative or regulatory proceeding against an Organization, but only if and only during the time such proceeding is also commenced and continuously maintained against an Insured Person. 160. 161. 162. 163. 164. 165. 166. 167. Id. at 875. Id. at 877. Id. at 878. MBIA, 652 F.3d at 160. Id. at 156. Id. at 159. Id. at 161. Id. at 162. Id. at 161. (Proskauer, 2d ed., 11/16) 16–39 © Practising Law Institute § 16:3.2 PROSKAUER ON PRIVACY Modern policies, including cyber policies, have dealt with these issues in a variety of ways, including provisions providing explicit coverage for informal inquiries or the cost of preparing an individual to testify, but some of these provisions do not cover the substantial cost that the company, as opposed to the individual, may be forced to incur, particularly where there is extensive electronic discovery or document productions. Insureds generally should seek coverage with a low threshold for what triggers coverage in relation to a regulatory investigation. Another issue that is sometimes raised by insurers where policyholders seek coverage for a regulatory investigation or action is whether there has been a “Wrongful Act” under the definitions in the relevant policy. For example, in Employers’ Fire Ins. Co. v. ProMedica Health Sys., Inc.,168 the court considered whether there was coverage for a FTC antitrust investigation169 that culminated in the FTC initiating an administrative proceeding against the policyholder.170 The policy in ProMedica defined “Wrongful Act” to include “‘any actual or alleged’ antitrust violation.”171 Rejecting several contrary decisions, the ProMedica court concluded that the FTC investigation was not “for a Wrongful Act” because the FTC did not “affirmatively accuse [the policyholder] of antitrust violations” until it filed its January 13, 2011 administrative action. 172 According to the court, until the commencement of an administrative action, the FTC investigation had merely sought to determine whether the policyholder had committed antitrust violations.173 Thus, the ProMedica court held that there was no coverage under the policy until August 2011 when the FTC filed a complaint against the policyholder alleging various antitrust violations.174 The requirement of a “Wrongful Act” was also recently confronted in one of the few reported decisions interpreting a cyber risk policy. 175 In Federal Recovery Services, the court held that the insurer had no duty to defend its insured under its CyberFirst policy in a suit where 168. 169. 170. 171. 172. 173. 174. 175. Emp’rs Fire Ins. Co. v. ProMedica Health Sys., Inc., 524 F. App’x 241 (6th Cir. 2013). Note that the insurer in ProMedica had denied coverage on the basis that the policyholder’s notice was not timely; thus, it was the policyholder, not the insurer, arguing that a “Claim” had not arisen under the policy until the filing of the Federal Trade Commission’s administrative proceedings. Emp’rs Fire Ins., 524 F. App’x at 243. Id. at 247. Id. at 248. Id. at 250. Id. at 251. Travelers Prop. Cas. Co. of Am. v. Fed. Recovery Servs., 103 F. Supp. 3d 1297 (D. Utah 2015). 16–40 © Practising Law Institute Insurance Coverage for Data Breaches § 16:3.2 the sole allegations related to intentional conduct—that the insured refused to return its client’s customer information. 176 The court reasoned that the claims were not an “error, omission, or negligent act” as required by the policy since the underlying lawsuit alleged that the insured acted willfully and with malice.177 Many cyber policies eliminate these issues by not including the same kind of requirements for “formal investigation” or specific assertions of “Wrongful Acts” that sometimes exist in other types of traditional policies. The extent of coverage for regulatory investigations and informal actions, as well as coverage for regulatory remedies and the availability of defense coverage,178 should be carefully considered in evaluating cyber coverage. [G] Definition of Loss Another area raised by regulatory activities is coverage for fines, penalties, and disgorgement. Some policies purport to exclude coverage for fines and penalties or for violations of law.179 Others explicitly provide such coverage. 180 Even where such remedies are covered by the policy language, insurers sometimes argue that the coverage is contrary to public policy. This issue was considered by the Illinois Supreme Court in Standard Mutual Insurance Co. v. Lay,181 where the insurer argued that statutory damages of $500 per violation under the Telephone Consumer Protection Act182 should be denied as akin to punitive damages. Some states hold that coverage for punitive damages is contrary to public 176. 177. 178. 179. 180. 181. 182. Id. at 1302. Id. See notes 191 and 193, infra, and accompanying text. See, e.g., Mortenson v. Nat’l Union Fire Ins. Co., 249 F.3d 667, 669 (7th Cir. 2001) (“the policy excludes losses consisting of ‘fines or penalties imposed by law or other matters’”); Hartford Fire Ins. Co. v. Guide Corp., 2005 WL 5899840, at *2 (S.D. Ind. Feb. 14, 2005) (policy at issue “contains an exclusion for punitive damages, fines, and penalties”); see also Big 5 Sporting Goods Corp. v. Zurich Am. Ins. Co., 957 F. Supp. 2d 1135 (C.D. Cal. 2013) (adopting insurer argument that civil penalties, attorney fees, and disgorgement under California statute are not covered damages under insurance policy), aff ’d, 635 F. App’x 351 (9th Cir. 2015); notes 86–87, supra. See, e.g., Taylor v. Lloyd’s Underwriters of London, 1994 WL 118303, at *7 (E.D. La. Mar. 25, 1994) (contract stated: “Clause (9) of the P&I policy actually extends coverage for: Liability for fines and penalties. . . .”) (emphasis in original); CNA Insurance Company, Fiduciary Liability Solutions Policy, GL2131XX (2005) (insurance policy covered a percentage of liability for fines and penalties for violations of ERISA, its English equivalent, and HIPAA requirements). Standard Mut. Ins. Co. v. Lay, 989 N.E.2d 591 (Ill. 2013). See note 77, supra. (Proskauer, 2d ed., 11/16) 16–41 © Practising Law Institute § 16:3.2 PROSKAUER ON PRIVACY policy183 or is allowed only under limited circumstances. 184 After a careful analysis of the history of the statute, the Illinois Supreme Court concluded in Lay that the statutory damages under the TCPA were compensatory in nature and not precluded by public policy.185 In an effort to avoid such issues, many policies contain provisions that allow coverage for punitive damages or regulatory remedies to be governed by “favorable law” or by law of a specific jurisdiction such as England or Bermuda, which have case law permitting such coverage.186 There also has been active litigation in recent years concerning the availability of insurance for certain regulatory remedies such as disgorgement. In some cases, the issue is dealt with as an issue of public policy with different courts taking different views of the issue. While some cases suggest that disgorgement of ill-gotten gains may not be insurable as a matter of public policy,187 others come to a 183. 184. 185. 186. 187. See, e.g., Ace Am. Ins. Co. v. Dish Network LLC, 2016 WL 1182744 (D. Colo. Mar. 28, 2016) (holding that an award of $500 per TCPA violation “constitutes a penalty or an ilk of punitive damages which may not be covered by insurance”); Soto v. State Farm Ins. Co., 635 N.E.2d 1222, 1224 (N.Y. 1994) (“a rule permitting recovery for excess civil judgments attributable to punitive damage awards would be unsound public policy”). See, e.g., Magnum Foods, Inc. v. Cont’l Cas. Co., 36 F.3d 1491, 1497–98 (10th Cir. 1994) (holding that insurance coverage of punitive damages is against public policy, except when the party seeking coverage has been held liable for punitive damages solely under vicarious liability) (internal citation omitted). Lay, 989 N.E.2d at 599–602; see also Evanston Ins. Co. v. Gene by Gene Ltd., 155 F. Supp. 3d 706 (S.D. Tex. 2016) (holding that the request for actual and statutory damages “falls under the Policies’ definition of damages”); Columbia Cas. Co. v. HIAR Holding, LLC, 411 S.W.3d 258 (Mo. 2013) (holding that “TCPA statutory damages of $500 per occurrence are not damages in the nature of fines or penalties”). See, e.g., Lancashire Cty. Council v Mun. Mut. Ins. Ltd [1997] QB 897 (Eng.) (“There is no present authority in English law which establishes that it is contrary to public policy for an insured to recover under a contract of insurance in respect of an award of exemplary damages whether imposed in relation to his own conduct or in relation to conduct for which he is merely vicariously liable. Indeed newspapers, we are told, regularly insure against exemplary damages for defamation.”). See, e.g., Ryerson Inc. v. Fed. Ins. Co., 676 F.3d 610, 613 (7th Cir. 2012) (describing a policy that covers disgorgement of ill-gotten gains and stating that “no state would enforce such an insurance policy”); Unified W. Grocers, Inc. v. Twin City Fire Ins. Co., 457 F.3d 1106, 1115 (9th Cir. 2006) (“California case law precludes indemnification and reimbursement of claims that seek the restitution of an ill-gotten gain”) (citation omitted); Level 3 Commc’ns, Inc. v. Fed. Ins. Co., 272 F.3d 908, 910 (7th Cir. 2001) (district court should have ruled that disgorging profits of theft is against 16–42 © Practising Law Institute Insurance Coverage for Data Breaches § 16:3.2 different conclusion.188 In some cases, decisions turn on whether there is a true disgorgement of profits, the regulator is a pass-through, or a disgorgement is a surrogate measure of damages. 189 Putting public policy arguments aside, the language of the policy may be important. It is more difficult for insurers to argue that disgorgement is not covered where the policy covers “loss” as opposed to “damages.”190 Depending on policy wording, defense costs may be covered with respect to a disgorgement claim even where a court holds that public policy precludes indemnity coverage. 191 Similarly, an insurer may be obligated to pay defense costs though a regulatory remedy may not be covered, as long as the regulatory proceeding 188. 189. 190. 191. public policy); Mortenson v. Nat’l Union Fire Ins. Co., 249 F.3d 667, 672 (7th Cir. 2001) (“It is strongly arguable, indeed, that insurance against the section 6672(a) penalty, by encouraging the nonpayment of payroll taxes, is against public policy[.]”). See, e.g., Genzyme Corp. v. Fed. Ins. Co., 622 F.3d 62, 69 (1st Cir. 2010) (“We see no basis in Massachusetts legislation or precedent for concluding that the settlement payment is uninsurable as a matter of public policy.”); Westport Ins. Corp. v. Hanft & Knight, P.C., 523 F. Supp. 2d 444, 453 (M.D. Pa. 2007) (finding an insurer ’s argument that public policy prohibits coverage for disgorgement “unavailing”); Genesis Ins. Co. v. Crowley, 495 F. Supp. 2d 1110, 1120 (D. Colo. 2007) (court declined to adopt insurer ’s argument that disgorgement is uninsurable as a matter of public policy); BLaST Intermediate Unit 17 v. CNA Ins. Cos., 674 A.2d 687, 689–90 (Pa. 1996) (finding that coverage for disgorgement of ill-gotten gains did not violate public policy). See, e.g., JP Morgan Sec., Inc. v. Vigilant Ins. Co., 992 N.E.2d 1076 (N.Y. 2013) (denying motion to dismiss filed by insurers on the ground that payment by Bear Stearns constituted uninsurable disgorgement where Bear Stearns agreed to pay $160 million designated as “disgorgement” in the SEC order but “the SEC order does not establish that the $160 million disgorgement payment was predicated on moneys that Bear Stearns itself improperly earned as a result of its securities violations”); Limelight Prods., Inc. v. Limelite Studios, Inc., 60 F.3d 767, 769 (11th Cir. 1995) (“recognizes ill-gotten profits as merely another form of damages that the statute permits to be presumed because of the proof unavailability in these actions”). Compare Chubb Custom Ins. Co. v. Grange Mut. Cas. Co., 2011 U.S. Dist. LEXIS 111583, at *31 (S.D. Ohio Sept. 29, 2011) (a policy ’s definition of loss covered wrongfully retained money), with Cont’l Cas. Co. v. Duckson, 826 F. Supp. 2d 1086, 1097 (N.D. Ill. 2011) (“return of profits obtained illegally does not constitute covered damages”). See, e.g., Vigilant Ins. Co. v. Credit Suisse First Bos. Corp., 2003 WL 24009803, at *5 (N.Y. Sup. Ct. July 8, 2003) (finding that because the “term ‘loss’ includes defense costs,” insurer must pay for them, even though the remedy for disgorgement of ill-gotten gains is not insurable as a matter of public policy). (Proskauer, 2d ed., 11/16) 16–43 © Practising Law Institute § 16:3.2 PROSKAUER ON PRIVACY constitutes a claim under the applicable policy definition. 192 Finally, as noted above, policies sometimes contain specific choice-of-law provisions requiring application of the law of a jurisdiction that favors coverage for remedies like fines or penalties.193 [H] Who Controls Defense and Settlement The issue of who controls the selection of counsel, the course of defense, and decisions whether to settle can be extremely important under any insurance policy. Many policies, including cyber policies, give the insurer varying degrees of control over these issues. An insured should carefully consider these matters at the time a policy is being negotiated, when there may be some flexibility on both sides, as opposed to after a claim arises. With respect to the selection of counsel, many insurance policies that contain the duty to defend give the insurance company the unilateral right to appoint counsel unless there is a reservation of rights or some other situation that gives the insured the right to appoint counsel at the insurer’s expense.194 Policyholders are often surprised to find that they are confronted with a case that is very important to them but that their policy allows the attorneys or other professionals to be selected and controlled in varying degrees by the insurer. While this may be appropriate in routine matters without significant reputational or other exposure to the company, or in situations where there is a service that has been bargained and paid for by the insured, many insureds confronted with a cyber breach prefer to select and utilize their own counsel. It is important that policy language be negotiated that permits this approach if that is what is desired. 192. 193. 194. See, e.g., Bodell v. Walbrook Ins. Co., 119 F.3d 1411, 1414 (9th Cir. 1997) (holding that an insurer must pay defense costs related to a U.S. Postal Inspection Service investigation, as the regulatory proceeding constituted a claim under the policy, even though a remedy for fraud would not be covered). See text accompanying supra note 185. Compare Twin City Fire Ins. Co. v. Ben Arnold-Sunbelt Beverage Co., 433 F.3d 365, 366 (4th Cir. 2005) (“The insurance company, in turn, typically chooses, retains, and pays private counsel to represent the insured as to all claims.”), with HK Sys., Inc. v. Admiral Ins. Co., 2005 WL 1563340, at *16 (E.D. Wis. June 27, 2005) (when there is a conflict of interest between the insurer and the insured, “the insurer retains the right either to choose independent counsel or to allow the insured to choose counsel at the insurer’s expense”), San Diego Navy Fed. Credit Union v. Cumis Ins. Soc’y, 208 Cal. Rptr. 494, 506 (Ct. App. 1984) (“[T]he insurer must pay the reasonable cost for hiring independent counsel by the insured . . . [and] may not compel the insured to surrender control of the litigation.”), superseded by CAL. CIV. CODE § 2860 (2012), and Md. Cas. Co. v. Peppers, 355 N.E.2d 24, 31 (Ill. 1976) (insured “has the right to be defended . . . in case by an attorney of his own choice” that is paid for by insurer, when there is a conflict between insurer and insured). 16–44 © Practising Law Institute Insurance Coverage for Data Breaches § 16:3.2 A compromise position in some policy forms involves the use of “panel counsel.” Under this approach, the policyholder is entitled to select counsel for the defense of the claim, but choices are restricted to a list of lawyers designated by the insurer. In some cases, the list is appended to the policy. In others, it is set forth on a website maintained by the insurer.195 In either case, at least in the absence of a conflict, the policyholder may be contractually limited to selecting counsel from the panel counsel list. The panel counsel lists of most major insurance companies include some well-known and able lawyers; however, there can be problems with the panel counsel approach from the insured’s prospective. First, panel counsel often expect to receive an ongoing flow and volume of work from the insurance company. As a result, they may be extremely attentive to the insurance company’s approach and the way in which it wants to handle cases. Second, in some cases, panel counsel have agreed to handle cases for a particular insurance company ’s insureds at sharply discounted rates. In some cases, these rate requirements may preclude from the panel firms with major expertise in a particular area. In others, they may incentivize insurers to use less experienced lawyers. Third, panel counsel are not necessarily lawyers typically used by the policyholder. As a result, they may have no familiarity with the policyholder or its business and management and may lack the trust built by a long attorney-client relationship. In light of these concerns, it is important to review carefully any panel counsel provisions in a particular policy. In many cases where a company has a “go-to” counsel that it expects to use in the event of a covered claim, the insurance company will agree in advance to include those lawyers on their panel counsel list for that particular insured. This is an issue that should be considered when the policy is being negotiated since it is frequently easier to negotiate inclusion of a policyholder ’s normal counsel at the time the policy is being negotiated, as opposed to after a claim has occurred. The issue of selection of counsel is closely aligned to the questions of control of defense and control of settlement. Particularly where there is a duty to defend, the insurer may have a high degree of control of the defense of a claim. While disagreements between the insurer and the insured on defense strategy may raise difficult issues,196 the key for present purposes is, again, to consider the matter when the policy 195. 196. See, e.g., Panel Counsel Directory, AIG (May 24, 2013), www-238.aig. com/default.aspx; Approved Panel Counsel Defense Firms, CHUBB GROUP OF INSURANCE COMPANIES (July 5, 2012, 3:30 PM), www.chubb.com/ businesses/csi/chubb8548.html. See, e.g., N. Cty. Mut. Ins. Co. v. Davalos, 140 S.W.3d 685, 689 (Tex. 2004) (“Every disagreement [between insurer and insured] about how the defense should be conducted cannot amount to a conflict of interest. . . . If (Proskauer, 2d ed., 11/16) 16–45 © Practising Law Institute § 16:3.2 PROSKAUER ON PRIVACY is being negotiated so the insured understands the implications of the policy being purchased. At a minimum, the insured will almost always have a duty to cooperate with its insurer that raises issues about privilege and other matters. 197 In addition, policies may include insurer rights to consent to covered expenditures that should be reviewed both when a policy is negotiated and in the event of a claim.198 These issues may be particularly significant in the area of settlement. Most policies give an insurer the right to consent to any settlement. In some cases, a policyholder may want to settle and the insurer believes the amount proposed is excessive. In certain circumstances, the insurer can refuse to consent,199 but may face liability in 197. 198. 199. it did, the insured, not the insurer, could control the defense by merely disagreeing with the insurer ’s proposed actions.”). See generally 3 JEFFREY E. THOMAS, NEW APPLEMAN ON INSURANCE LAW LIBRARY EDITION § 17.07 (2012). See, e.g., Martinez v. Infinity Ins. Co., 714 F. Supp. 2d 1057 (C.D. Cal. 2010) (insurance policy at issue imposed upon the insured a duty to cooperate to hand over privileged financial documents, car payment records, and maintenance records to the insurer); Kimberly-Clark Corp. v. Cont’l Cas. Co., 2006 U.S. Dist. LEXIS 63576, at *5 (N.D. Tex. Aug. 18, 2006) (“attorney-client communications or attorney work product . . . are not abrogated by the cooperation clause”); Purze v. Am. Alliance Ins. Co., 781 F. Supp. 1289, 1292–93 (N.D. Ill. 1991) (the duty to cooperate in the insurance contract at issue involved insured giving insurer banking information); Remington Arms Co. v. Liberty Mut. Ins. Co., 142 F.R.D. 408, 416 (D. Del. 1992) (even when an insured has a duty to cooperate with insurer, “insurance coverage actions did not foreclose the assertion of attorney-client privilege”); Waste Mgmt., Inc. v. Int’l Surplus Lines Ins. Co., 579 N.E.2d 322, 327 (Ill. 1991) (“condition in the policy requiring cooperation on the part of the insured is one of great importance. . . . A fair reading of the terms of the contract renders any expectation of attorney-client privilege, under these circumstances, unreasonable.”). See generally 3 JEFFREY E. THOMAS, NEW APPLEMAN ON INSURANCE LAW LIBRARY EDITION § 16.04 (2012). See, e.g., CHUBB CyberSecurity Form 14-02-14874, § XIV.C (2009) (“No Insured shall settle or offer to settle any Claim . . . without the Company’s prior written consent”). But see Booking v. Gen. Star Mgmt. Co., 254 F.3d 414, 421 (2d Cir. 2001) (“[A] breach of a ‘settlementwithout-consent’ clause is material only if it prejudices the insurer.”) (internal citation omitted) (applying Texas law); Progressive Direct Ins. Co. v. Jungkans, 972 N.E.2d 807, 811 (Ill. App. Ct. 2012) (“[A]n insurer who invokes a cooperation clause must affirmatively show that it was prejudiced by the insured’s failure to notify it in advance of his settlement with the tortfeasor.”). See, e.g., Certain Underwriters of Lloyd’s v. Gen. Accident Ins. Co. of Am., 909 F.2d 228, 232 (7th Cir. 1990) (an insurer may refuse to settle, as “the insurer has full control over defense of the claim, including the decision to settle”). 16–46 © Practising Law Institute Insurance Coverage for Data Breaches § 16:3.2 excess of policy limits if the insured is later required to pay a judgment in excess of the proposed settlement.200 Alternatively, the insurer may want to settle where the policyholder does not. Some policies give the insurer the right to do this, while other policies and case law do not.201 Some policies provide that where an insurer wants to settle and an insured does not, only a portion of fees and settlement costs will be covered in the future.202 Again, the starting place is the policy, so the language should be considered at the time the policy is negotiated. [I] Control of Public Relations Professionals Many cyber policies provide coverage for certain kinds of crisis management activities, which may encompass expenses of public relations experts and certain kinds of advertising.203 Typically, the dollar limits for such coverages are relatively low, but these coverage provisions may cede control of public relations experts and budget, in varying degrees, to the insurer. Media experts who deal with cyber privacy breaches can have special expertise, and some policyholders 200. 201. 202. 203. See, e.g., Nat’l Union Fire Ins. Co. v. Cont’l Ill. Corp., 673 F. Supp. 267, 270 (N.D. Ill. 1987) (“Illinois has long recognized an insured’s right to hold the insurer responsible for an amount in excess of the policy limits when the insurer has been guilty of fraud, bad faith or negligence in refusing to settle the underlying claim against the insured within those limits.”); Am. Hardware Mut. Ins. Co. v. Harley Davidson of Trenton, Inc., 124 F. App’x 107, 112 (3d Cir. 2005) (“The Rova Farms rule is thus: (1) if a jury could find liability, (2) where the verdict could exceed the policy limit, and (3) the third-party claimant is willing to settle within the policy limit, then (4) in order to be deemed to have acted in good faith, the insurer must initiate settlement negotiations and exhibit good faith in those negotiations. American Hardware was obligated to initiate settlement negotiations and did not; therefore it acted in bad faith and is liable for the excess verdict.”). Compare Sec. Ins. Co. v. Schipporeit, Inc., 69 F.3d 1377, 1383 (7th Cir. 1995) (policy required the insured’s consent to a settlement), and Brion v. Vigilant Ins. Co., 651 S.W.2d 183, 184 (Mo. Ct. App. 1983) (terms of the policy required the insured’s consent), with Papudesu v. Med. Malpractice Joint Underwriting Ass’n of R.I., 18 A.3d 495, 498–99 (R.I. 2011) (insurance policy gave the insurer the right to settle “as it deems expedient,” even without insured’s consent). See, e.g., CHUBB CyberSecurity Form 14-02-14874, § XIV.D (2009) (“If any Insured withholds consent to any settlement acceptable to the claimant . . . then the Company’s liability for all Loss, including Defense Costs, from such Claim shall not exceed the amount of the Proposed Settlement plus Defense Costs incurred[.]”). See, e.g., CHUBB CyberSecurity Form 14-02-14874, § I.C. (2009) (providing coverage for crisis management expenses, which includes advertising and public relations media and activities). (Proskauer, 2d ed., 11/16) 16–47 © Practising Law Institute § 16:3.2 PROSKAUER ON PRIVACY view insurer expertise in selecting the right experts and managing these kinds of situations as one of the benefits of purchasing coverage. Other policyholders may not wish to relinquish control of these issues, particularly where limits applicable to crisis management expenses are small. In some cases, the policyholder may deal with these issues by negotiating with the insurer to include the policyholder ’s chosen expert as an option under the policy. In any event, selection and management of public relations professionals, like selection of defense attorneys, is an issue that should be evaluated in purchasing cyber coverages. [J] Issues Created by Policyholder Employees Some policies exclude “loss caused by an employee.”204 This kind of exclusion can be problematic in a cyber policy where cyber issues may sometimes involve an inside job. Even where there is not a blanket employee exclusion, insurance policies often preclude coverage for liabilities expected or intended or damage knowingly caused by “the insured.”205 A common question in insurance contracts, which is equally significant in the context of cyber policies, is whose knowledge controls the applicability of potentially applicable exclusions. The obvious concern in the cyber context is the situation where an employee is intentionally responsible for a privacy breach or perhaps for selling confidential information to others. Resultant claims against the employee are likely excluded, in varying degrees, by most insurance policies. But the question that arises is whether any applicable exclusions are limited to the responsible employee or the corporate policyholder as a whole. Case law developed under traditional insurance coverages has varied with respect to the extent to which knowledge or intentional misconduct by an employee can be attributed to the policyholder for purposes of denying coverage. Some cases require the knowledge to be 204. 205. See, e.g., Ace American Insurance Company Commercial Crime Policy, www.acegroup.com/us-en/assets/commercial-crime-policy-loss-sustainedform.pdf (last visited Sept. 27, 2016). See, e.g., Everest Nat’l Ins. Co. v. Valley Flooring Specialties, 2009 U.S. Dist. LEXIS 36757, at *19 (E.D. Cal. Apr. 14, 2009) (“intentional and knowing conduct exclusions unambiguously apply”); Auto Club Grp. Ins. Co. v. Marzonie, 527 N.W.2d 760, 768 (Mich. 1994) (policy precluded coverage for injury that was intended or activity that “the actor knew or should have known” would cause injury), abrogated by Frankenmuth Mut. Ins. Co. v. Masters, 595 N.W.2d 832 (Mich. 1999). See generally 3 ALLAN WINDT, INSURANCE CLAIMS AND DISPUTES § 11:9 (6th ed. 2013). 16–48 © Practising Law Institute Insurance Coverage for Data Breaches § 16:3.2 by a senior person or officer or director for the intent to be attributed to the company.206 Others may not.207 Today, many policies deal with this issue by a severability clause. A typical such clause states that no fact pertaining to and no knowledge possessed by any insured person shall be imputed to another insured person, and many specify that only the knowledge of certain company officers is imputed to the company.208 Under such clauses, the knowledge or intent is limited to the relevant individual and not attributed to others.209 A second issue with these kinds of exclusions concerns the situation where knowledge or intent is disputed. While some policies limit the ability of an insurer to deny coverage in this context to situations in which there has been a “final adjudication,” the courts vary on whether such adjudication must be in an underlying case or can be in an insurance coverage case, including one initiated by the carrier. 210 206. 207. 208. 209. 210. See, e.g., Legg Mason Wood Walker, Inc. v. Ins. Co. of N. Am., 1980 U.S. Dist. LEXIS 13088, at *18 (D.D.C. July 24, 1980) (because neither of individuals involved in intentional misconduct was an officer, director, stockholder, or partner, the insured’s claim is still covered by insured). See, e.g., FMC Corp. v. Plaisted & Cos., 72 Cal. Rptr. 2d 467, 61 Cal. App. 4th 1132, 1212–13 (Ct. App. 1998) (upholding jury instructions that stated “[K]nowledge which a corporation’s employee receives or has in mind when acting in the course of his or her employment is in law the knowledge of the corporation, if such knowledge concerns a matter within the scope of the employee’s duties”), overruled by California v. Cont’l Ins. Co., 281 P.3d 1000 (Cal. 2012). See, e.g., CHUBB CyberSecurity Form 14-02-14874, § IV (2009) (“for the purposes of determining the applicability of [certain exclusions] . . . A. no fact pertaining to or knowledge possessed by any Insured Person shall be imputed to any other Insured Person to determine if coverage is available; and B. only facts pertaining to or knowledge possessed by an Insured Organization’s [certain executive officers] shall be imputed to such Insured Organization to determine if coverage is available”); see generally 4 JEFFREY E. THOMAS, APPLEMAN ON INSURANCE § 26.07 (2012). See, e.g., Chrysler Ins. Co. v. Greenspoint Dodge of Houston, Inc., 297 S.W.3d 248, 253 (Tex. 2009) (stating, in the context of a severability clause, “intent and knowledge for purposes of coverage are determined from the standpoint of the particular insured, uninfluenced by the knowledge of any additional insured”). See, e.g., Wintermute v. Kan. Bankers Sur. Co., 630 F.3d 1063 (8th Cir. 2011) (insurer not relieved of duty to defend based on personal profit and dishonesty exclusions unless proven in underlying case that the director actually received personal gain or was involved in dishonest acts); Pendergest-Holt v. Certain Underwriters at Lloyd’s of London, 600 F.3d 562, 573 (5th Cir. 2010) (“in fact” language is read more broadly than a “final adjudication” clause and satisfied by a final judgment in either the underlying case or a separate coverage case); Atl. Permanent Fed. Sav. & Loan Ass’n v. Am. Cas. Co., 839 F.2d 212 (4th Cir. 1988) (the exclusion does not apply unless there is a judgment adverse to the officers and directors in the underlying suit); see also infra notes 211–13. (Proskauer, 2d ed., 11/16) 16–49 © Practising Law Institute § 16:3.2 PROSKAUER ON PRIVACY Many policies deal with this issue in a final adjudication clause. An illustrative policy provision provides: The company shall not be liable under Insuring Clause X for Loss on account of any Claim made against any Insured Person: (a) based upon, arising from, or in consequence of any deliberately fraudulent act or omission or any willful violation of any statute or regulation by such Insured Person, if a final, non-appealable adjudication in any underlying proceeding or action establishes such a deliberately fraudulent act or omission or willful violation; or (b) based upon, arising from, or in consequence of such Insured Person having gained any profit, remuneration or other advantage to which such Insured Person was not legally entitled, if a final, non-appealable adjudication in any underlying proceeding or action establishes the gaining of such a 211 profit, remuneration or advantage. Note that the specific reference to “underlying proceeding” is designed to require the adjudication in the underlying case.212 These kinds of provisions are important to policyholders. They are typically construed to require defense and indemnity in the absence of a final adjudication so that the insured is entitled to coverage in the event of a settlement where there has never been an actual adjudication of wrongdoing.213 Another type of exclusion involving company employees seeks to preclude coverage for failure to consistently implement cyber risk controls.214 These kinds of exclusions need to be carefully vetted and limited to specific policies and procedures to avoid subsequent differences as to what is a relevant procedure and what is not. 211. 212. 213. 214. See, e.g., Chubb D&O Policy Form 14-02-18489 (2012) (emphasis added). See generally Dan A. Bailey, D&O Policy Commentary, in INSURANCE COVERAGE 2004: CLAIM TRENDS & LITIGATION, at 205, 215 (PLI Litig. & Admin. Practice, Course Handbook Ser. No. 702, 2004) (when a D&O policy requires “final adjudication” in the underlying action to trigger an exclusion, courts have held that the adjudication must occur in the underlying proceeding and not in a parallel coverage action). See, e.g., Atl. Permanent Fed. Sav. & Loan Ass’n v. Am. Cas. Co., 839 F.2d 212 (4th Cir. 1988) (the exclusion does not apply unless there is a final judgment adverse to the officers and directors in the underlying suit). See, e.g., Complaint, Columbia Cas. Co. v. Cottage Health Sys., No. 15cv-03432 (C.D. Cal. May 7, 2015) (excluding “[a]ny failure of an Insured to continuously implement the procedures and risk controls identified in the Insured’s application . . . and all related information submitted to the Insurer”). 16–50 © Practising Law Institute Insurance Coverage for Data Breaches § 16:3.2 [K] Coverage of a Threatened Security Breach Most insurance policies cover actual damages.215 The common liability policy, for example, covers bodily injury, property damage, and advertising injury. Property damage policies typically cover direct physical damage.216 While some property damage policies also cover costs to avoid certain harm to physical property,217 that may not always encompass a security breach, much less a threatened security breach (sometimes referred to as a “ransomware attack”). Cyber policies typically deal with this risk explicitly by covering the cost to respond to a threat of first-party loss or third-party liability due to a cyber breach.218 It is important to review a cyber policy carefully to be sure that threats, as opposed to only actual damage, are covered, 219 especially in light of the increasing frequency of extortionist cyber threats and ransomware attacks.220 It is also important to evaluate policy language to determine if the policy only covers threats to extort money or other kinds of threats as well. 215. 216. 217. 218. 219. 220. See, e.g., QBE Ins. Corp. v. ADJO Contracting Corp., 934 N.Y.S.2d 36 (Sup. Ct. 2011) (“A policy is implicated when the insured learns of an actual loss or injury covered by the policy, and not when the insured learns only of a potentially dangerous condition.”) (citing Chama Holding Corp. v. Generali-US Branch, 22 A.D.3d 443, 444–45 (N.Y. App. Div. 2005)). But see Baughman v. U.S. Liab. Ins. Co., 662 F. Supp. 2d 386, 393 (D.N.J. 2009) (“court-ordered medical monitoring with costs to be paid by defendants . . . is ‘damages’ under [the policy],” even though not actual damage). See, e.g., Wash. Mut. Bank v. Commonwealth Ins. Co., 2006 Wash. App. LEXIS 1316, at *6–7 (Ct. App. June 26, 2006) (holding that plain language of property damage policy required “direct physical loss of or damage to insured property”). Id. at *11. See, e.g., CHUBB CyberSecurity Form 14-02-14874, § I.J (2009) (“The Company shall pay E-Threat Expenses resulting directly from an Insured having surrendered any funds or property to a natural person who makes a Threat directly to an Insured during the Policy Period.”); Philadelphia Insurance Co. Cyber Security Liability Coverage Form PI-CYB-001, § I.C (2010) (“We will reimburse you for the extortion expenses and extortion monies . . . paid by you and resulting directly from any credible threat or series of credible threats.”). Some recent case law suggests that increased risk of future harm after a cyber-attack may be sufficient for plaintiffs’ standing. See, e.g., In re Adobe Sys. Privacy Litig., 66 F. Supp. 3d 1197 (N.D. Cal. 2014). See, e.g., JAMES SCOTT & DREW SPANIEL, INST. FOR CRITICAL INFRASTRUCTURE TECH., THE ICIT RANSOMWARE REPORT 3 (2016) (warning that “2016 is the year ransomware will wreak havoc on America’s critical infrastructure community”); Press Release, Fed. Financial Insts. Exam. Council, FFIEC Releases Statement on Cyber Attacks Involving Extortion (Nov. 3, 2015) (notifying members of “the increasing frequency and severity of cyber attacks involving extortion”), www.ffiec.gov/press/ pr110315.htm. (Proskauer, 2d ed., 11/16) 16–51 © Practising Law Institute § 16:3.2 PROSKAUER ON PRIVACY [L] Governmental Activity Exclusion Cyber policies should also be reviewed for provisions limiting coverage for government-sponsored activities. Traditional policies often limit coverage for war or acts of terrorism and, even where they cover terrorist activity by individuals or political groups, policies may exclude coverage for acts of government or government-sponsored organizations. This may be particularly problematic in the cyber context where cyberspace has recently been deemed a warfare “domain” by the United States government.221 Numerous recent reports have discussed the allegations of government-sponsored hacking by China, North Korea, Russia, and other countries, including into U.S. government agencies and major corporations.222 One report identified as many as 141 distinct entities or organizations that had breaches of cybersecurity at the hands of the Chinese army in the last seven years.223 The Office of the Secretary of Defense has publicly accused the Chinese government of conducting cyber espionage,224 and the U.S. Department of Justice has indicted five Chinese military officers, 221. 222. 223. 224. Jim Garamone, Cybercom Chief Discusses Importance of Cyber Operations, U.S. DEP ’T OF DEFENSE (Apr. 14, 2015), www.defense.gov/ News-Article-View/Article/604453/cybercom-chief-discusses-importanceof-cyber-operations. See, e.g., Chris Strohm, No Sign China Has Stopped Hacking U.S. Companies, Official Says, BLOOMBERG TECH. (Nov. 18, 2015), www. bloomberg.com/news/articles/2015-11-18/no-sign-china-has-stoppedhacking-u-s-companies-official-says (“The Chinese government hasn’t stopped hacking American companies to steal industrial trade secrets, despite pledges to do so, the top U.S. national counterintelligence official said[.]”); China Suspected in Massive Breach of Federal Personnel Data, AP, June 4, 2015 (“China-based hackers are suspected of breaking into the computer networks of the U.S. government personnel office and stealing identifying information of at least 4 million federal workers, American officials said Thursday.”); Evan Perez & Shimon Prokupecz, How the U.S. Thinks Russians Hacked the White House, CNN, Apr. 8, 2015, www.cnn. com/2015/04/07/politics/how-russians-hacked-the-wh/; Bob Orr, Why the U.S. was Sure North Korea Hacked Sony, CBS NEWS, Jan. 19, 2015, www. cbsnews.com/news/why-the-u-s-government-was-sure-north-koreahacked-sony/; FBI’s James Comey Accuses China of Hacking into Every Major American Company, INDEPENDENT (Oct. 6, 2014), www.indepen dent.co.uk/news/business/news/fbis-james-comey-accuses-china-of-hack ing-into-every-major-american-company-9777587.html (“[FBI Director] James Comey says there are two types of American companies: those that have been hacked and those that don’t know it yet[.]”). David E. Sanger, David Barboza & Nicole Perlroth, Chinese Army Unit Is Seen as Tied to Hacking Against U.S, N.Y. TIMES, Feb. 18, 2013, at A1. See OFFICE OF SECRETARY OF DEFENSE, ANNUAL REPORT TO CONGRESS: MILITARY AND SECURITY DEVELOPMENTS INVOLVING THE PEOPLE’S REPUBLIC OF C HINA 2013, archive.defense.gov/pubs/2013_China_Report_ FINAL.pdf; see also Shannon Tiezzi, China (Finally) Admits to Hacking (Mar. 18, 2015), http://thediplomat.com/2015/03/china-finally-admits-to-hacking/. 16–52 © Practising Law Institute Insurance Coverage for Data Breaches § 16:3.2 alleging they hacked U.S. companies’ computers to steal trade secrets.225 Given the significance of this threat, cyber policies should be reviewed to ensure that coverage for government-sponsored cyber roles is not excluded. [M] Other Exclusions Cyber policies often contain important exclusions that substantially narrow coverage. For example, some cyber policies exclude damage to computers and related business interruption on the theory that these risks should be covered by a more traditional property policy, at least when due to natural causes. 226 Cyber policies may also exclude securities claims,227 but a cyber breach involving a company’s confidential financial information may be among its most important risks. Employment claims are also excluded under certain cyber policies, though the disclosure of confidential information about employees is an important risk for many companies. 228 Insurers may also argue that antitrust exclusions are implicated where information is stolen or disclosed for anticompetitive purposes. Another important exclusion may concern business interruption. Some policies specifically exclude business interruption due to a cyber breach. Others specifically provide that coverage. 229 An insured should evaluate the potential impact of cyber losses on its ability to conduct business and determine whether business interruption for this kind of loss is necessary or appropriate. Exclusions barring coverage for liability assumed under contract or agreement are also increasingly important in the cyber context. The potential role of the contract exclusion is illustrated by the recent 225. 226. 227. 228. 229. Devlin Barrett & Siobhan Gorman, U.S. Charges Five in Chinese Army with Hacking, WALL ST. J., May 19, 2014, http://online.wsj.com/news/ articles/SB10001424052702304422704579571604060696532. See, e.g., Philadelphia Insurance Co. Cyber Security Liability Coverage Form PI-CYB-001, § IV.C (2010) (excluding from loss expenses arising out of “fire, smoke, explosion, lightning, wind, flood, earthquake, volcanic eruption . . . or any other physical event or peril”); see also CHUBB CyberSecurity Form 14-02-14874, § III.C.6 (2009) (excluding from loss any expense “resulting from mechanical failure, faulty construction, error in design, latent defect, wear or tear, gradual deterioriation”). See, e.g., Philadelphia Insurance Co. Cyber Security Liability Coverage Form PI-CYB-001, § IV.R (2010) (excluding from coverage violations of the Securities Exchange Act). See, e.g., Philadelphia Insurance Co. Cyber Security Liability Coverage Form PI-CYB-001, § IV.L (2010) (excluding from coverage employment practices or discrimination claims). See, e.g., Travelers Cyber Risk Form CYB-3001, § I.J (2010) (“The Company will pay the Insured Organization for Business Interruption Loss incurred by the Insured Organization which is directly caused by a Computer System Disruption taking place during the Policy Period[.]”). (Proskauer, 2d ed., 11/16) 16–53 © Practising Law Institute § 16:3.2 PROSKAUER ON PRIVACY decision denying P.F. Chang’s claim for coverage under a Chubb CyberSecurity policy.230 The case involved a data breach in which over 60,000 of the restaurant chain’s customers’ credit card numbers were allegedly compromised.231 The insurer reimbursed its insured for certain costs incurred in conducting a forensic investigation into the data breach and the costs of defending litigation filed by third parties whose credit card information was stolen—costs commonly covered under cyber policies. Chubb, however, denied coverage for amounts the insured owed to its credit card servicer under their master service agreement (MSA), which included: (1) reimbursement of fraudulent charges on the stolen credit cards; (2) the costs to notify cardholders affected by the breach and to reissue new cards to those individuals; and (3) a flat fee relating to P.F. Chang’s compliance with Payment Card Industry Data Security Standards (PCI DSS). 232 In addition to holding that the fees to the credit card servicer did not trigger coverage under the policy’s definition of a “Privacy Injury,”233 the court held that coverage was barred under two exclusions precluding coverage for contractual obligations assumed by the insured. 234 In support of this, the court cited the MSA between the insured and its credit card servicer, which required the insured to reimburse the servicer for the fees the servicer incurred (for example, reimbursement of fraudulent charges, notification costs).235 Credit card arrangements are often covered by specific provisions in cyber policies. Insureds that process credit card transactions as a part of their business should give particular attention to these provisions and should consider cyber policies that explicitly include this coverage.236 230. 231. 232. 233. 234. 235. 236. P.F. Chang’s China Bistro, Inc. v. Fed. Ins. Co., 2016 WL 3055111 (D. Ariz. May 31, 2016). Id. at *1–2. Id. Id. at *4–5. The court held that there was no “Privacy Injury,” because that term was defined to “injury sustained or allegedly sustained by a Person because of actual or potential unauthorized access to such Person’s Record, or exceeding access to such Person’s Record.” Id. at *4. Since the lost credit card information belonged to the customers’ themselves—not the credit card servicer that brought suit against P.F. Chang’s—there was no injury sustained by a Person because of unauthorized to “such Person’s record.” Id. Id. at *7–8. Id. at *8. See, e.g., AIG, Specialty Risk Protector, CyberEdge Security and Privacy Liability Insurance, Security and Privacy Coverage Section, at 2(h), 2(j) (2013) 16–54 © Practising Law Institute Insurance Coverage for Data Breaches § 16:3.2 [N] Physical Impact from a Cyber-Attack With the ever-increasing “Internet of things,”237 the availability of devices prone to cyber-attacks continues to grow on a daily basis. Coupled with this is the growing threat of physical damage caused by a cyber-attack. For example, a hacker could attack a manufacturer ’s operating system, causing a breakdown in equipment. While few such incidents have been widely reported, they are no longer restricted to science fiction or the movies.238 Policyholders at risk of suffering physical damage from a cyber-attack need to assess their coverage, since many cyber policies exclude third-party liability coverage for bodily injury and property damage,239 and traditional coverages increasingly include their own cyber-related exclusions. 240 237. 238. 239. 240. (defining “Loss” to include “amounts payable in connection with a PCIDSS Assessment,” which is in turn is defined as “any written demand received by an Insured from a Payment Card Association . . . or bank processing payment card transactions . . . for a monetary assessment (including a contractual fine or penalty) in connection with an Insured’s non-compliance with PCI Data Security Standards which resulted in a Security Failure or Privacy Event”), www.aig.com/content/dam/aig/americacanada/us/documents/business/cyber/cyberedge-wording-sample-specimenform.pdf . “The Internet of Things (IoT) is a computing concept that describes a future where everyday physical objects will be connected to the Internet and be able to identify themselves to other devices.” Internet of Things (IoT), TECHOPEDIA, www.techopedia.com/definition/28247/internet-ofthings-iot (last visited Aug. 17, 2016). See, e.g., Lucy L. Thomson, Cyber Physical Risk, ABA Litigation Section Insurance Coverage Litigation Committee, at 7–12 (2016) (discussing attacks ranging from the disabling of a computer system designed to detect pipeline leaks (that caused a major oil spill and loss of life) to a hacking incident causing four trains to derail); see also LLOYD ’S EMERGING RISK REPORT 2015, BUSINESS BLACKOUT: THE INSURANCE IMPLICATIONS OF A CYBER ATTACK ON THE US POWER GRID (2015) (describing the severe potential implications of a hypothetical attack on a “smart” power grid, resulting in a widespread blackout across the Northeast, leaving millions without power and shutting down phone systems, Internet, television, traffic signals, factories and commercial activity for several days), www. lloyds.com/~/media/files/news%20and%20insight/risk%20insight/2015/ business%20blackout/business%20blackout20150708.pdf; What Every CISO Needs to Know About Cyber Insurance, at 2 (Symantec White Paper 2015) (“Experts are telling us we could experience a massive cyber terrorist event that could cause major market disruptions, and even physical damage to property and critical infrastructure.”), www.symantec.com/ content/dam/symantec/docs/white-papers/what-every-ciso-needs-to-knowcyber-insurance-en.pdf See, e.g., note 226 and accompanying text. See, e.g., notes 30–31 supra and accompanying text; see also Institute Cyber Attack Exclusion Clause (CL 380) (Oct. 11, 2003) (“in no case shall this insurance cover loss damage liability or expense directly caused by or (Proskauer, 2d ed., 11/16) 16–55 © Practising Law Institute § 16:3.3 PROSKAUER ON PRIVACY One option for filling this potential gap in coverage may be cyber difference-in-conditions (DIC) coverage, which is now offered by several insurers and generally provides coverage for perils excluded under other policies.241 Policyholders should work closely with their information technology professionals, brokers, risk managers, and attorneys to review their existing scope of coverages and the potential need for DIC cyber insurance. § 16:3.3 SEC Disclosure and Other Regulatory Initiatives Insurance for cyber risks, and an understanding of such insurance, takes on additional significance in the wake of guidance issued by the SEC on October 13, 2011.242 This guidance requires publicly traded companies to disclose, among other things: • risk factors relating to a potential cyber incident, including known or threatened attacks; • costs and other consequences associated with known cyber incidents or risks of potential incidents; • material legal proceedings involving cyber incidents; and • insurance for cyber risks.243 These requirements underscore the need for cyber insurance and a clear understanding of what such policies cover, as failure to make disclosures could potentially subject registrants to SEC enforcement action and shareholder suits.244 241. 242. 243. 244. contributed to by or arising from the use or operation, as a means for inflicting harm, of any computer, computer system, computer software programme, malicious code, computer virus or process or any electronic system”). See, e.g., Cyber Coverage & Services, AEGIS (offering a difference-inconditions option “which wraps coverage around existing policies, i.e., property, casualty, terrorism and environmental” and “delivers full cyber coverage for physical damage, bodily injury and environmental issues”), www.aegislink.com/aegislink/services/underwriting/products/cyber-coverageand-services.html (last visited Aug. 17, 2016); AIG CyberEdge PC (Apr. 2014 (offering umbrella difference-in-conditions coverage for, inter alia, property damage)), www.aig.com/content/dam/aig/america-canada/us/documents/busi ness/cyber/cyberedge-pc-product-profile-final.pdf. CF Disclosure Guidance: Topic No. 2, Cybersecurity, U.S. Sec. & Exch. Comm’n (Oct. 13, 2011), www.sec.gov/divisions/corpfin/guidance/cfguidance-topic2.htm. Id. See section 16:2.3[A], supra. 16–56 © Practising Law Institute Insurance Coverage for Data Breaches § 16:3.3 As noted above, the SEC has emphasized that cybersecurity and board of director responsibilities in this area will be a principal focus of law enforcement efforts.245 In addition to the SEC, other federal government agencies have increased their focus on cyber insurance–related issues. As noted above, the FTC has become active and aggressive in this area.246 The Department of Homeland Security, for example, convened a Cybersecurity Insurance Workshop in 2012 to discuss pricing, insurable risks, and challenges associated with cyber insurance.247 The White House identified a cybersecurity policy coordinator, convened a multidisciplinary group on cybersecurity-related jobs (including insurance industry positions), and issued an executive order on cybersecurity risks.248 The resultant executive order was entitled “Improving Critical Infrastructure Cybersecurity” and directed the National Institute of Standards and Technology to develop a voluntary cybersecurity framework.249 These efforts have continued to result in new initiatives and scrutiny on cybersecurity.250 Governmental activities at the state, federal, and international levels will continue to evolve and may have an impact on the availability of insurance products and government requirements for cyber insurance. For example, on the international stage, the European Union and the United States have agreed to, but 245. 246. 247. 248. 249. 250. Comm’r Luis A. Aguilar, Address at Cyber Risks and the Boardroom Conference: Boards of Directors, Corporate Governance and Cyber-Risks: Sharpening Focus (June 10, 2014); see also supra section 16:3.2[F]. See note 147, supra. See U.S. D EP ’ T OF H OMELAND S EC ., N AT ’ L P ROTECTION & P ROGRAMS DIRECTORATE, CYBERSECURITY INSURANCE WORKSHOP READOUT R EPORT (Nov. 2012), www.dhs.gov/sites/default/files/publications/ cybersecurity-insurance-read-out-report.pdf. See White House Author Michael Daniel, WHITE HOUSE BLOG, www. whitehouse.gov/blog/author/michael-daniel (last visited Aug. 17, 2016); see also Press Release, AccessWire, Innovation Insurance Group President Participates in Cyber “Jobs of the Future” Event at White House (June 5, 2012), www.innovationinsurancegroup.com/images/IIG-ISA_WH_Security_ Workplace_Event_Press_Release_6-4.pdf; Press Release, White House, Exec. Order—Improving Critical Infrastructure Cybersecurity (Feb. 19, 2013), www. whitehouse.gov/the-press-office/2013/02/12/executive-order-improving-criticalinfrastructure-cybersecurity. See Cybersecurity Framework, NAT ’L INST. OF STANDARDS & TECH. (Aug. 17, 2016), www.nist.gov/cyberframework/. Assessments: Cyber Resilience Review (CRR), U.S. COMPUTER EMERGENCY R EADINESS T EAM [US-CERT], www.us-cert.gov/ccubedvp/selfservice-crr (last visited Aug. 17, 2016); National Protection and Programs Directorate, DEP ’T OF HOMELAND SEC. (June 27, 2016), www.dhs.gov/nationalprotection-and-programs-directorate; see, e.g., Mark A. Hofmann, Senate Panel Takes Up Cyber Insurance Issues, BUS. INS., Mar. 19, 2015, www.business insurance.com/article/20150319/NEWS06/150319798. (Proskauer, 2d ed., 11/16) 16–57 © Practising Law Institute § 16:3.3 PROSKAUER ON PRIVACY have not yet finalized, the EU-U.S. Privacy Shield that will impose more regulations on U.S. companies to protect the personal information of Europeans.251 251. See Julia Fioretti, EU, United States Agree on Changes to Strengthen Data Transfer Pact, REUTERS (June 24, 2016), www.reuters.com/article/us-eudataprotection-usa-idUSKCN0ZA1QT. 16–58
© Copyright 2026 Paperzz